SlideShare ist ein Scribd-Unternehmen logo
1 von 36
CAPTCHA
Telling Humans and Computers Apart
           Automatically
                        Presented by: Vruti Surani
                        5th sem-computer
                        En.No.-090350131055
Agenda

Introduction
History
Types
Application
Process
Breaking captcha
Recaptcha
Unbreakable captcha
Benefits
Drawbacks
Conclusion
Reference
What is CAPTCHA??


CAPTCHA (Completely Automated Public Turing
Test To Tell Computers and Humans Apart).

The P for Public means that the code and the
data used by a CAPTCHA should be publicly
available.

T for “Turing Test to Tell” is because
CAPTCHAs are like Turing Tests.
What is CAPTCHA??
                              Continues…



Captcha is a program that protect website
against bots by generating and grading test
that
          -Human can pass
                      but
          -Computer program can’t
What is CAPTCHA??
                               Continues…



Captcha requires that the user types letters
or digits from distorted image appears on
screen.
If correct solution is entered than system
assumes that response is generated
     -by user.
 else
     -by bots & access denied.
What is CAPTCHA??
                                 Continues…


  Standard Interpretation
 player C, the interrogator,
  is tasked with trying to
  determine which player
  - A or B - is a computer and
  which is a human.
History behind CAPTCHA

Captcha word comes from capture.

it is also known as reverse turing test.

About 200 million CAPTCHAs are solved by humans
around the world every day.

First developed by Alta Vista in 1997.

The term coined in 2000 by Luis von Ahn, Manuel
Blum and Nicholas j. Hopper of Carnegie Mellon
university and john Langford of IBM.
Types of CAPTCHA


 Text Based CAPTCHA
 Gimpy,ez-gimpy
 Gimpy-r, Google CAPTCHA
 Simard’s HIP
 Graphics Based CAPTCHA
 Bongo
 Pix
 Audio Based CAPTCHA
Text Based CAPTCHA


  Gimpy
 Initially used by yahoo ,in this CAPTCHA two steps are
  followed as:
  a) Pick a word or words from a small dictionary
  b) Distort them and add noise and background
Text Based CAPTCHA

  Gimpy-R
 This was used by google and was basically a simple
  advance over gimpy. Here instead of a complete
  word individual letters are noised instead of
  complete words. steps followed are as:
  a) Pick random letters
  b) Distort them, add noise and background



  Type three words appearing in the image.
Text Based CAPTCHA


  Simcard’s
 Here further advances made and arcs being made
  into it ie. Curved geometrical shapes. Hence steps
  followed are as:
  a)Pick random letters and numbers
  b)Distort them and add arcs
Some Screenshots of
      Text Based CAPTCHA

Pictures of CAPTCHA
implemented by some popular
websites.
Graphics Based CAPTCHA

  Bongo
 Following steps are followed in
  BONGO CAPTCHAS as:
  a)Display two series of blocks
  b)User must find the characteristic
  that sets the two series apart
  c)User is asked to determine which
  series each of four single blocks
  belongs to.                           To which side does the block
                                        on the bottom belong?
Graphics Based CAPTCHA
                                               Continues…

  Pix
 This is the second kind of graphics
  CAPTCHA using distorted images.Steps
  followed in its usage are as:
  a) Create a large database of labeled
     images
  b) Pick a concrete object
  c) Pick four images of the object from
     the images database
  d) Distort the images
  e) Ask the user to pick the object for a
     list of words                           To which side does the block
                                             on the bottom belong?
Some Screenshots of
        Graphics Based CAPTCHA




a. GIMPY CAPTCHA



                     b. PIX CAPTCHA
Audio Based CAPTCHA


 These are based on humans ability to depict sounds that
  may be distorted, following algorithm is followed in
  using it:
  a) Pick a word or a sequence of numbers at random
  b) Render them into an audio clip using a TTS software
  c) Distort the audio clip
  d) Ask the user to identify and type the word or numbers
Applications

  Email services:
 CAPTCHAs are used in attempts to prevent
  automated software from performing actions
  which degrade the quality of service of a given
  system,whether due to abuse or resource
  expenditure. CAPTCHAs can be deployed to
  protect systems vulnerable to e-mail spam, such
  as the webmail services
  of Gmail, Hotmail, and Yahoo! Mail..
Applications
                                 Continues…

 Dictionary attacks:
 CAPTCHAs can also be used to prevent dictionary
  attacks in password systems. The idea is simple:
  prevent a computer from being able to iterate
  through the entire space of passwords by
  requiring it to solve a CAPTCHA after a certain
  number of unsuccessful logins.
Applications
                                      Continues…

  Protecting Website Registration:
 Several companies (Yahoo!, Microsoft, etc.) offer
  free email services. Up until a few years ago, most of
  these services suffered from a specific type of attack:
  "bots" that would sign up for thousands of email
  accounts every minute. The solution to this problem
  was to use CAPTCHAs to ensure that only humans
  obtain free accounts. In general, free services should
  be protected with a CAPTCHA in order to prevent
  abuse by automated programs.
Processes

Generate CAPTCHA

Align CAPTCHA

Cut CAPTCHA

Transform CAPTCHA

Decode CAPTCHA
Generate captcha
                         Continues...




CAPTCHA generated with our Mathematical
code.
Align captcha
                         Continues...




Remove gridlines


                         Crop CAPTCHA
Undo angle of rotation
Cut captcha
                          Continues...


Cut CAPTCHA cut into 5 pieces.
Transform captcha
                              Continues...


Perform the HWT on each of the 5 pieces
Decode captcha
                       Continues...


Decoding the captcha
Breaking CAPTCHA


Most text based CAPTCHAs have been broken by
software
 OCR(Optical Character Recognization)
 Segmentation




Other CAPTCHAs were broken by streaming the tests
for unsuspecting users to solve.
Re-Captcha


Free captcha service that helps to digitize
books, newspaper and old time radio shows.

Recaptcha improves the process of digitizing
books by sending words that can’t be read by
computers to the web in form of captchas for
human to decipher.
Working of Re-Captcha
                          Continues...

Two words are shown, one word is known as
control word and another one is known as a
questionable word.

System assumes that if human types the
control word correctly, then the questionable
word is also correct.
Example of Re-Captcha
           Continues...
New unbreakable Captcha




Used at: http://www.yuniti.com/register.php
Benefits

The database already exists and is public.

The database is constantly being updated and
maintained.

Adding “concrete objects” to the dictionary is
virtually instantaneous.

Distortion prevents caching hacks.

Quick expiration limits streaming hacks.
Drawbacks


Not accessible to people with disabilities (which
is the case of most CAPTCHAs).

Relies on Google’s infrastructure.

Unlike CAPTCHAs using random letters and
numbers, the number of challenge words is
limited.
Conclusion


Captchas are an effective way to and reduce
spam

They serves dual purpose- help advance AI
knowledge

Applications are varied from stopping bots to
character reorganization and pattern matching.
References


Wikipedia(http://en.wikipedia.org/CAPTCHA)
Carnegie Mellon School of Computer Science Web
site (http://www.captcha.net)
“Telling Humans and Computers Apart” by Luis von
Ahn and colleagues.
Xerox Palo Alto Research Center
(http://www2.parc.com/ istl/projects/captcha/)
Captcha
Captcha

Weitere ähnliche Inhalte

Was ist angesagt?

Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Vivek Maskara
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
 
Advanced Captcha Report
Advanced Captcha ReportAdvanced Captcha Report
Advanced Captcha ReportArpit Gupta
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdfKumbidiGaming
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based CaptchaKAUSHAL KUMAR JHA
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 

Was ist angesagt? (20)

CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Captcha
CaptchaCaptcha
Captcha
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Captcha1
Captcha1Captcha1
Captcha1
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha report
Captcha reportCaptcha report
Captcha report
 
Advanced Captcha Report
Advanced Captcha ReportAdvanced Captcha Report
Advanced Captcha Report
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based Captcha
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Captcha
CaptchaCaptcha
Captcha
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 

Andere mochten auch

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)chhoup
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 

Andere mochten auch (12)

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 

Ähnlich wie Captcha

CSE captcha ppt.pptx
CSE captcha ppt.pptxCSE captcha ppt.pptx
CSE captcha ppt.pptxRohit713364
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharmavinit1991
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranningRaj Fageria
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEditor IJCATR
 
Captcha & its types
Captcha & its typesCaptcha & its types
Captcha & its typesindrathakur001
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologiesMonika Keerthi
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologiesMonika Keerthi
 
563.10.3 captcha
563.10.3 captcha563.10.3 captcha
563.10.3 captchasaishanker
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical PasswordIRJET Journal
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET Journal
 

Ähnlich wie Captcha (20)

CSE captcha ppt.pptx
CSE captcha ppt.pptxCSE captcha ppt.pptx
CSE captcha ppt.pptx
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha a web security
Captcha a web securityCaptcha a web security
Captcha a web security
 
CAPTCHA.pptx
CAPTCHA.pptxCAPTCHA.pptx
CAPTCHA.pptx
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
 
Jean captcha-ppt
Jean captcha-pptJean captcha-ppt
Jean captcha-ppt
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
 
14A81A05A8
14A81A05A814A81A05A8
14A81A05A8
 
Captcha & its types
Captcha & its typesCaptcha & its types
Captcha & its types
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
 
Captcha
CaptchaCaptcha
Captcha
 
captcha
captcha captcha
captcha
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
563.10.3 captcha
563.10.3 captcha563.10.3 captcha
563.10.3 captcha
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Captcha
CaptchaCaptcha
Captcha
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Captcha

  • 1. CAPTCHA Telling Humans and Computers Apart Automatically Presented by: Vruti Surani 5th sem-computer En.No.-090350131055
  • 3. What is CAPTCHA?? CAPTCHA (Completely Automated Public Turing Test To Tell Computers and Humans Apart). The P for Public means that the code and the data used by a CAPTCHA should be publicly available. T for “Turing Test to Tell” is because CAPTCHAs are like Turing Tests.
  • 4. What is CAPTCHA?? Continues… Captcha is a program that protect website against bots by generating and grading test that -Human can pass but -Computer program can’t
  • 5. What is CAPTCHA?? Continues… Captcha requires that the user types letters or digits from distorted image appears on screen. If correct solution is entered than system assumes that response is generated -by user. else -by bots & access denied.
  • 6. What is CAPTCHA?? Continues… Standard Interpretation  player C, the interrogator, is tasked with trying to determine which player - A or B - is a computer and which is a human.
  • 7. History behind CAPTCHA Captcha word comes from capture. it is also known as reverse turing test. About 200 million CAPTCHAs are solved by humans around the world every day. First developed by Alta Vista in 1997. The term coined in 2000 by Luis von Ahn, Manuel Blum and Nicholas j. Hopper of Carnegie Mellon university and john Langford of IBM.
  • 8. Types of CAPTCHA Text Based CAPTCHA  Gimpy,ez-gimpy  Gimpy-r, Google CAPTCHA  Simard’s HIP Graphics Based CAPTCHA  Bongo  Pix Audio Based CAPTCHA
  • 9. Text Based CAPTCHA Gimpy  Initially used by yahoo ,in this CAPTCHA two steps are followed as: a) Pick a word or words from a small dictionary b) Distort them and add noise and background
  • 10. Text Based CAPTCHA Gimpy-R  This was used by google and was basically a simple advance over gimpy. Here instead of a complete word individual letters are noised instead of complete words. steps followed are as: a) Pick random letters b) Distort them, add noise and background Type three words appearing in the image.
  • 11. Text Based CAPTCHA Simcard’s  Here further advances made and arcs being made into it ie. Curved geometrical shapes. Hence steps followed are as: a)Pick random letters and numbers b)Distort them and add arcs
  • 12. Some Screenshots of Text Based CAPTCHA Pictures of CAPTCHA implemented by some popular websites.
  • 13. Graphics Based CAPTCHA Bongo  Following steps are followed in BONGO CAPTCHAS as: a)Display two series of blocks b)User must find the characteristic that sets the two series apart c)User is asked to determine which series each of four single blocks belongs to. To which side does the block on the bottom belong?
  • 14. Graphics Based CAPTCHA Continues… Pix  This is the second kind of graphics CAPTCHA using distorted images.Steps followed in its usage are as: a) Create a large database of labeled images b) Pick a concrete object c) Pick four images of the object from the images database d) Distort the images e) Ask the user to pick the object for a list of words To which side does the block on the bottom belong?
  • 15. Some Screenshots of Graphics Based CAPTCHA a. GIMPY CAPTCHA b. PIX CAPTCHA
  • 16. Audio Based CAPTCHA  These are based on humans ability to depict sounds that may be distorted, following algorithm is followed in using it: a) Pick a word or a sequence of numbers at random b) Render them into an audio clip using a TTS software c) Distort the audio clip d) Ask the user to identify and type the word or numbers
  • 17. Applications Email services:  CAPTCHAs are used in attempts to prevent automated software from performing actions which degrade the quality of service of a given system,whether due to abuse or resource expenditure. CAPTCHAs can be deployed to protect systems vulnerable to e-mail spam, such as the webmail services of Gmail, Hotmail, and Yahoo! Mail..
  • 18. Applications Continues… Dictionary attacks:  CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins.
  • 19. Applications Continues… Protecting Website Registration:  Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated programs.
  • 20. Processes Generate CAPTCHA Align CAPTCHA Cut CAPTCHA Transform CAPTCHA Decode CAPTCHA
  • 21. Generate captcha Continues... CAPTCHA generated with our Mathematical code.
  • 22. Align captcha Continues... Remove gridlines Crop CAPTCHA Undo angle of rotation
  • 23. Cut captcha Continues... Cut CAPTCHA cut into 5 pieces.
  • 24. Transform captcha Continues... Perform the HWT on each of the 5 pieces
  • 25. Decode captcha Continues... Decoding the captcha
  • 26. Breaking CAPTCHA Most text based CAPTCHAs have been broken by software  OCR(Optical Character Recognization)  Segmentation Other CAPTCHAs were broken by streaming the tests for unsuspecting users to solve.
  • 27. Re-Captcha Free captcha service that helps to digitize books, newspaper and old time radio shows. Recaptcha improves the process of digitizing books by sending words that can’t be read by computers to the web in form of captchas for human to decipher.
  • 28. Working of Re-Captcha Continues... Two words are shown, one word is known as control word and another one is known as a questionable word. System assumes that if human types the control word correctly, then the questionable word is also correct.
  • 29. Example of Re-Captcha Continues...
  • 30. New unbreakable Captcha Used at: http://www.yuniti.com/register.php
  • 31. Benefits The database already exists and is public. The database is constantly being updated and maintained. Adding “concrete objects” to the dictionary is virtually instantaneous. Distortion prevents caching hacks. Quick expiration limits streaming hacks.
  • 32. Drawbacks Not accessible to people with disabilities (which is the case of most CAPTCHAs). Relies on Google’s infrastructure. Unlike CAPTCHAs using random letters and numbers, the number of challenge words is limited.
  • 33. Conclusion Captchas are an effective way to and reduce spam They serves dual purpose- help advance AI knowledge Applications are varied from stopping bots to character reorganization and pattern matching.
  • 34. References Wikipedia(http://en.wikipedia.org/CAPTCHA) Carnegie Mellon School of Computer Science Web site (http://www.captcha.net) “Telling Humans and Computers Apart” by Luis von Ahn and colleagues. Xerox Palo Alto Research Center (http://www2.parc.com/ istl/projects/captcha/)

Hinweis der Redaktion

  1. Front Page of the presentation where I have to start the presentation.
  2. CAPTCHA itself is a abbreviation for COMPLETELY AUTOMATED PUBLIC TURING test to tell COMPUTERS and HUMANS APART
  3. Defination of CAPTCHA as per it’s official website.
  4. Examples of CAPTCHA used by well known websites.