7.IJAEST-Vol-No-6-Issue-No-2-Implementation-of-Secure-Multilayered-CAPTCHA-200-219

Page 1

Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

Implementation of Secure Multilayered CAPTCHA Ramesh Babu .A1

Praveen kumar .K2

Dr. Srinivasa Rao.V3

Student (M.Tech) Sr.Lecturer Professor & Head Department of Computer Science and Engineering V R Siddhartha Engineering College Vijayawada, A.P-520007

T

rameshbabu023@gnail.com1 praveen@vrsiddhartha.ac.in hodcse@vrsiddhartha.com3

ABSTRACT

attack from malicious computer program.

In order to avoid tremendous attack from

The 3-layered dynamic CAPTCHA can be

malicious computer programs, CAPTCHA

implemented

(Completely Automated Public Turing test

concept. Three layers are: Character Layer,

to tell Computers and Human Apart)

Background

mechanism

Foreground Interference Layer.

using

ES

has

by

been

introduced

to

distinguish humans and computers. They are

the

Interference

“layered�

Layer

and

used to protect various kinds of online

Keywords

ser vices fr om advertising spam, brute

CAPTCHA; 3-layer; dynamic; single-frame zero knowledge theory; biological vision theory; moving objects recognition

A

force attacks and denial of service by automatic computer programs. In general the present CAPTCHAS are 2D. Due to the

1. INTRODUCTION CAPTCHA is a program that can tell

artificial intelligence technology, there are

whether its user is a human or a computer. It

increasing

can also be defined as the program that can

IJ

fast development of pattern recognition and safety

loopholes

concerning

traditional 2D static CAPTCHAs, resulting

generate and grade tests that:

in that certain malicious computer programs

a. Most humans can pass

could launch serious program attack through

b. Current computer programs cannot pass

breaking such CAPTCHA.

So in our project we propose a practical and safe 3-layer dynamic CAPTCHA which is very hard to break and which prevent the

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 200


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

a human. The interrogator can't see or hear the participants and has no way of knowing which is which. If the interrogator is unable to figure out which participant is a machine based on the responses, the machine passes the

Turing

Test.Of

course,

with

a

CAPTCHA, the goal is to create a test that humans can pass easily but machines can't. It's also important that the CAPTCHA application is able to present different

T

Fig 1.1 Functionality of CAPTCHA

CAPTCHAs to different users. If a visual CAPTCHA presented a static image that was

• Completely

the same for every user, it wouldn't take long

ES

CAPTCHA is an acronym for

before

a

spammer

spotted

the

form,

deciphered the letters, and programmed an

Automated

Public

Turing test to tell

Computers and

Humans

the user with a series of spoken letters or

Apart

numbers. It's not unusual for the program to

application to type in the correct answer automatically.

One alternative to a visual test is an audible

IJ

A

one. An audio CAPTCHA usually presents

distort the speaker's voice, and it's also common for

the program to include

CAPTCHA technology has its foundation in

background noise in the recording. This

an experiment called the Turing Test. Alan

helps thwart voice recognition programs.

Turing, sometimes called the father of

Another option is to create a CAPTCHA

modern computing, proposed the test as a

that asks the reader to interpret a short

way to examine whether or not machines

passage of text. A contextual CAPTCHA

can think -- or appear to think -- like

quizzes the reader and tests comprehension

humans. The classic test is a game of

skills. While computer programs can pick

imitation. In this game, an interrogator asks

out key words in text passages, they aren't

two participants a series of questions. One of

very good at understanding what those

the participants is a machine and the other is

words actually mean.

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 201


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

In 2007 nearly 95% of the mails received by the world’s Internet users were junk mails. Similar situations are registering user accounts maliciously, cracking account passwords with brute force, etc. All of these bring a great threat to the network.

comes into being, which is short for Completely Automated Public Turing Test to Tell Computers and Humans Apart. In first CAPTCHA group, followed by many

scholars studying CAPTCHA to find how to better tell between humans and computers in order

to prevent

from

issuing

advertisements or other useless information have

A

recklessly, message boards of BBS, blog and wiki

widely

with some questions which only a human user can solve. Examples of such questions 1. What is twenty minus three? 2. What is the third letter in UNIVERSITY? 3. Which of Yellow, Thursday and Richard is a colour?

4. If yesterday was a Sunday, what is today? Such questions are very easy for a

human user to solve, but it’s very difficult to

ES

2000 Carnegie Mellon University set up the

programs

yet novel approach is to present the user

T

happening again, CAPTCHA mechanism

malicious

These are simple to implement. The simplest

are:

In order to prevent similar incidents from

apart. Currently,

1.1.1 Text CAPTCHAs:

used

CAPTCHA

mechanism, requiring that users must input

program a computer to solve them. These are also friendly to people with visual disability – such as those with colour blindness. Other text CAPTCHAs involves text distortions and the user is asked to identify the text hidden. The various implementations are:

1.1.1.1 Gimpy:

CAPTCHA also plays a significant role in

Gimpy is a very reliable text CAPTCHA

IJ

the correct letters to leave a message. limiting usage rate. For example, the automatic use of a particular service is allowed unless such use goes beyond certain

built by CMU in collaboration with Yahoo for their Messenger service. Gimpy is based on the human ability to read extremely

1.1 TYPES OF CAPTCHAS

distorted text and the inability of computer

CAPTCHAs are classified based on what is

programs to do the same. Gimpy works by

distorted and presented as a challenge to the

choosing ten words randomly from a

user. They are:

dictionary, and displaying them in a

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 202


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

distorted and overlapped manner. Gimpy then asks the users to enter a subset of the words in the image. The human user is capable of identifying the words correctly,

overcomes

the

drawback

of

Gimpy

CAPTCHA because, Gimpy uses dictionary words and hence, clever bots could be designed to check the dictionary for the matching word by brute-force.

T

whereas a computer program cannot.

ES

Fig.1.3 Ez-Gimpy example

1.1.1.3 MSN CAPTCHA: Microsoft

Fig.1.2 Gimpy example 1.1.1.2 Ez-Gimpy:

uses

a

different

CAPTCHA for services provided under MSN umbrella. These are popularly called MSN Passport CAPTCHAs. They use eight

A

This is a simplified version of the Gimpy CAPTCHA, adopted by Yahoo in

their signup page. Ez – Gimpy randomly picks a single word from a dictionary and

IJ

applies distortion to the text. The user is

characters

(upper

case)

and

digits.

Foreground is dark blue, and background is grey. Warping is used to distort the characters, to produce a ripple effect, which makes computer recognition very difficult.

then asked to identify the text correctly. This was developed by Henry Baird

at University of California at Berkeley. This is a variation of the Gimpy. This doesn’t contain dictionary words, but it picks up random alphabets to create a nonsense but pronounceable text. Distortions are then added to this text and the user is challenged to guess the right word. This technique

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 203


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

Fig.1.5 Bongo example 1.1.2.2 PIX:

T

PIX is a program that has a large database of labeled images. All of these images are

Fig.1.4 MSN CAPTCHA example

pictures of concrete objects (a horse, a table, a house, a flower). The program picks an

ES

1.1.2 Graphic CAPTCHAs: Graphic CAPTCHAs are challenges

that involve pictures or objects that have some sort of similarity that the users have to guess. They are visual puzzles, similar to Mensa tests. Computer generates the puzzles to solve it.

A

and grades the answers, but is itself unable

1.1.2.1 Bongo:

object at random, finds six images of that object from its database, presents them to the user and then asks the question “what are these

pictures

of?”

Current

computer

programs should not be able to answer this question, so PIX should be a CAPTCHA. However,

PIX,

as

stated,

is

not

a

CAPTCHA: it is very easy to write a program that can answer the question “what are these pictures of?” Remember that all

the program we call BONGO [2]. BONGO

the code and data of a CAPTCHA should be

IJ

Another example of a CAPTCHA is who

publicly available; in particular, the image

published a book of pattern recognition

database that PIX uses should be public.

problems in the 1970s [3]. BONGO asks the

Hence, writing a program that can answer

user to solve a visual pattern recognition

the question “what are these pictures of?” is

problem. It displays two series of blocks, the

easy: search the database for the images

left and the right. The blocks in the left

presented and find their label. Fortunately,

series differ from those in the right, and the

this can be fixed. One way for PIX to

user must find the characteristic that sets

become a CAPTCHA is to randomly distort

them apart.

the images before presenting them to the

is

named after

M.M.

Bongard,

user, so that computer programs cannot

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 204


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

easily search the database for the undistorted

spoken language. Nancy Chan of the City

image. Pick the common characteristic

University in Hong Kong was the first to

among

implement a sound-based system of this

the

following

pictures-----

�Aeroplane�

type. The idea is that a human is able to efficiently disregard the distortion and interpret the characters being read out while software would struggle with the distortion being applied, and need to be effective at speech to text translation in order to be

T

successful. This is a crude way to filter humans and it is not so popular because the user has to understand the language and the

A

ES

accent in which the sound clip is recorded.

IJ

Fig.1.6 PIX example

1.1.3 Audio CAPTCHA: The final example we offer is based

on sound. The program picks a word or a sequence of numbers at random, renders the word or the numbers into a sound clip and distorts the sound clip; it then presents the distorted sound clip to the user and asks users to enter its contents. This CAPTCHA is based on the difference in ability between humans and computers in recognizing

ISSN: 2230-7818

Fig.1.7 example for Audio CAPTCHA

1.1.4

ReCAPTCHA and book

Digitization: To counter various drawbacks of the existing implementations, researchers at CMU developed a redesigned CAPTCHA aptly called the reCAPTCHA. About 200 million CAPTCHAs are solved by humans around the world every day. In each case, roughly ten seconds of human time are

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 205


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

being spent. Individually, that's not a lot of

by OCR is given to a user in conjunction

time, but in aggregate these little puzzles

with another word for which the answer is

consume more than 150,000 hours of work

already known. The user is then asked to

each day. What if we could make positive

read both words. If they solve the one for

use of this human effort? reCAPTCHA does

which the answer is known, the system

exactly that by channeling the effort spent

assumes their answer is correct for the new

solving CAPTCHAs online into "reading"

one. The system then gives the new image to

books.

a number of other people to determine, with higher confidence, whether the original

make information more accessible to the

answer was correct. Currently, reCAPTCHA

world,

is employed in digitizing books as part of

multiple projects

are currently

digitizing physical books that were written

the Google Books Project.

ES

before the computer age. The book pages are

T

To archive human knowledge and to

being photographically scanned, and then transformed Character

into

text

Recognition"

using

"Optical

(OCR).

The

transformation into text is useful because

scanning a book produces images, which are difficult to store on small devices, expensive

second line shows text read by OCR

A

to download, and cannot be searched. The

First line shows scanned text,

problem is that OCR is not perfect. ReCAPTCHA improves the process of digitizing books by sending words that

IJ

cannot be read by computers to the Web in the form of CAPTCHAs for humans to decipher. More specifically, each word that cannot be read correctly by OCR is placed on an image and used as a CAPTCHA. This is possible because most OCR programs alert you when a word cannot be read correctly. But if a computer can't read such a CAPTCHA, how does the system know the

Fig.1.8 examples for reCAPTCHA and Book digitization

correct answer to the puzzle? Here's how: Each new word that cannot be read correctly

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 206


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

1.2 APPLICATIONS: CAPTCHA s have several applications for practical security, including Preventing Comment Spam in Blogs: Most bloggers are familiar with programs that submit bogus comments, usually for the some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter

T

purpose of raising search engine ranks of

Fig.1.9

example

make users sign up before they enter a

registration

showing

website

ES

comments on a blog. There is no need to comment, and no legitimate comments are

Protecting Email Addresses From

ever lost!

Scrapers: Spammers crawl the Web in search of email addresses posted

companies (Yahoo!, Microsoft, etc.) offer

in clear text. CAPTCHAs provide

free email services. Up until a few years

an effective mechanism to hide your

ago, most of these services suffered from a

email address from Web scrapers.

specific type of attack: "bots" that would

The idea is to require users to solve

sign up for thousands of email accounts

a CAPTCHA before showing your

every minute. The solution to this problem

email address. A free and secure

was to use CAPTCHAs to ensure that only

implementation

humans obtain free accounts. In general, free

CAPTCHAs to obfuscate an email

services

address

IJ

A

Protecting Website Registration: Several

should

be

protected

with

a

CAPTCHA in order to prevent abuse by automated scripts.

can

that be

found

uses at

reCAPTCHA MailHide. Online Polls: In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 207


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

most online polls, IP addresses of

being able to iterate through the

voters were recorded in order to

entire

prevent single users from voting

requiring it to solve a CAPTCHA

more than once. However, students

after

at Carnegie Mellon found a way to

unsuccessful logins. This is better

stuff the ballots using programs that

than the classic approach of locking

voted for CMU thousands of times.

an account after a sequence of

CMU's

growing

unsuccessful logins, since doing so

rapidly. The next day, students at

allows an attacker to lock accounts

MIT wrote their own program and

at will.

started

the poll became a contest between voting "bots." MIT finished with

passwords

certain

number

Search

Engine

sometimes

Bots:

desirable

to

It

by of

is keep

webpage’s unindexed to prevent

ES

21,156 votes, Carnegie Mellon with

a

of

T

score

space

21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not

unless the poll ensures that only humans can vote.

others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't

IJ

A

read a web page; it only serves to

that don't want to allow them in. However, in order to truly guarantee

Worms and Spam: CAPTCHAs also offer a plausible solution

CAPTCHAs can also be used to attacks

in

password systems. The idea is simple: prevent a computer from

ISSN: 2230-7818

large companies, respect web pages

CAPTCHAs are needed.

Preventing Dictionary Attacks: dictionary

bots, since they usually belong to

that bots won't enter a web site,

Fig.1.10 example for online polling

prevent

say "no bots, please." Search engine

against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea.

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 208


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

Preventing Unauthorized Access:

obfuscation the CAPTCHA employs. Next,

The

mechanism

the algorithm might tell the computer to

prevents a hacker who tries to crack

detect patterns in the black and white image.

a

password using Brute force

The program compares each pattern to a

method or any other password

normal letter, looking for matches. If the

cracking method.

program can only match a few of the letters,

CAPTCHA

it might cross reference those letters with a database of English words. Then it would

The challenge in breaking a CAPTCHA isn't

plug in likely candidates into the submit

figuring out what a message says -- after all,

field. This approach can be surprisingly

humans should have at least an 80 percent

effective. It might not work 100 percent of

success rate. The really hard task is teaching

the time, but it can work often enough to be

a computer how to process information in a

worthwhile to spammers. What about more

ES

T

1.3 BREAKING CAPTCHA

way similar to how humans think. In many

complex

cases,

CAPTCHA displays 10 English words with

people who break CAPTCHAs

concentrate not

on making computers

warped

CAPTCHAs?

fonts

across

TheGimpy an

irregular

background. The CAPTCHA arranges the

problem posed by the CAPTCHA. Let's

words in pairs and the words of each pair

assume you've protected an online form

overlap one another. Users have to type in

using a CAPTCHA that displays English

three correct words in order to move

A

smarter, but reducing the complexity of the

words. The application warps the font

forward. How reliable is this approach? As it

slightly, stretching and bending the letters in

turns out, with the right CAPTCHA-

unpredictable

the

cracking algorithm, it's not terribly reliable.

CAPTCHA includes a randomly generated

Greg Mori and Jitendra Malik published a

In

addition,

IJ

ways.

background behind the word.

paper detailing their approach to cracking

A programmer wishing to break this

the Gimpy version of CAPTCHA

CAPTCHA could approach the problem in phases. He or she would need to write an

1.3.1

Breaking

CAPTCHAs

algorithm -- a set of instructions that directs a machine to follow a certain series of steps. In this scenario, one step might be to convert the image in grayscale. That means the application removes all the color from the image, taking away one of the levels of

ISSN: 2230-7818

without OCR: Most CAPTCHAs don't destroy the session when the correct phrase is entered. So by reusing the session id

of

a

known

CAPTCHA image, it is possible to automate

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 209


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

requests to a CAPTCHA-protected page.

mechanism:

Manual steps: Connect to CAPTCHA page

recognition) visual method, non-OCR visual

Record session ID and CAPTCHA plaintext

method and non-visual method.

OCR

(Optical

character

Automated steps: Resend session ID and The 2D static CAPTCHA based on OCR

changing the user data. The other user data

visual method takes advantage of superiority

can change on each request. We can then

in language barrier, security and easy use,

automate hundreds, if not thousands of

becoming the most widely used CAPTCHA.

requests, until the session expires, at which

Commonly seen CAPTCHAs are: Gimpy

point we just repeat the manual steps and

series CAPTCHA designed by Carnegie

then reconnect with a new session ID and

Mellon University in 2000, Pessimal Print

CAPTCHA text. Traditional CAPTCA-

CAPTCHA designed by Henry Baird from

breaking software involves using image

PARC(Palo Alto Research Center) in 2000,

ES

T

CAPTCHA plaintext any number of times,

recognition routines to decode CAPTCHA

and Baffle Text CAPTCHA designed by

images. This approach bypasses the need to

Baird in cooperation with Monica Chew

do any of that, making it easy to hack

from California Berkeley in 2003. However,

CAPTCHA images.

with

the

fast

development

of

OCR

technology based on neural network, as well as the emergence of a variety of character

2.1 AIM:

A

2. AIM AND SCOPE OF THE PROJECT

segmentation technology, CAPTCHAs of lots of websites have been attacked. A Russian programmer has ever cracked the CAPTCHA mechanism of Yahoo with 35%

tremendous attack from malicious computer

success

programs,

(Completely

mechanism of Microsoft live mail has been

Automated Public Turing test to tell

bothered by junk mails many times. Given

Computers and Human Apart) mechanism

facts like these, newly designed CAPTCHAs

has been introduced to distinguish humans

have become increasingly complex, so that

and computers.

some of those are extremely difficult to

IJ

The mainstay of this project is to avoid CAPTCHA

rate.

Also,

the

CAPTCHA

identify. 2.2 SCOPE OF THE PROJECT: 2.2.1 Existing System:

Though there are many different kinds of

Currently, there are mainly three kinds of

specific

methods to implement the CAPTCHA

visual method, it eventually comes down to

ISSN: 2230-7818

implementations

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

for

non-OCR

Page 210


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

2.2.2 Proposed System :

to identify images. It is not so widely used.

Dynamic CAPTCHA can make it not only

Up to now, except some research sites,

extremely hard to crack for computer

commercial sites rarely use it. Specific

programs using multiple frames, but also

implementation algorithms are: CAPTCHA

easy for humans to identify. According to

algorithm based on real object image

anatomical, physiological and functional

identification and designed by R. Datta, etc,

characteristics of the visual system, there are

CAPTCHA algorithm based on image

two visual pathways in the brain, the ventral

similarity judgment and designed by J.

pathway, which function is to identify

Elson, etc and so forth. Non-OCR visual

objects, and the dorsal pathway, which

method is designed for special occasions and

function is to identify spatial location and

certain user groups, thus it has very limited

movement of objects. Both the identifiability

applications.

and contrast ratio of images will affect

ES

T

the OCR problem in general, requiring users

moving objects. In the right hemisphere, 3D

are:

voice-based

CAPTCHA

movement shows stronger brain activity

algorithm intended for visually disabled

than 2D movement. The biological vision

people and designed by G. Kochanski, etc,

theory says that the perception ability of

CAPTCHA

on

moving objects far exceeds that of static

collaborative filtering and designed by M.

objects for biological vision. For example,

Chew and so forth. In conclusion, the OCR-

we can easily recognize a running cheetah in

algorithm

based

A

Examples

a jungle while could hardly notice a

way to implement current CAPTCHA

stationary cheetah in the jungle. The reason

mechanism. However, it could no longer

is that the human visual system can easily

strike a balance between security and easy

reconstruct the overall shape merely from

IJ

based 2D static visual method is the main

use, calling for a new kind of CAPTCHA to

vague displacements of parts of the moving

address

object.

this

increasingly

prominent

problem.

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 211


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

3. DESIGN 3.1 ARCHITECTURE:

Background Interference Layer (Image, Noise)

Foreground Interference Layer (Special Characters)

A

ES

T

Character Layer (A-Z|a-z|0-9)

3-Layer

Dynamic

IJ

CAPTCHA

Fig 3.1 Architecture of 3-Layer Dynamic CAPTCHA

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 212


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

4. IMPLEMENTATION 4.1 MODULES: 1. Character Layer 2. Background Interference Layer

4.1.1 Character layer Implementation of Character Layer is very simple, as described below: characters.

ES

1. Determination of the number of

T

3. Foreground Layer

CAPTCHA

often

consists of 4-7 characters, and we choose the minimum length 4.

2. Random selection of characters. Our program

randomly

chooses

4

characters from a total of 62 consisting

of

lowercase letters,

Fig.4.1 Example for Character

26

A

characters

layer module

26 uppercase

letters and 10 Arabic numerals. 3. Determination

Optional

IJ

attributes.

of

character character

attributes are size, font, color, tilt, twist,

spin,

etc.

In the same

CAPTCHA, a variety of fonts or different sizes can easily increase the difficulty of attack

4.1.2 Background Interference layer: The background interference of this design can include not only background color transformation and messy pixels or characters,

etc,

traditional

interference

sources used in 2D static images, but also light, smoke and texture rendering, etc, new interference sources used in 3D dynamic videos. In this case, we combine the interference point and the interference character, randomly selecting some regions

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 213


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

and generating a lot of interference points as well as an interference character.

5. RESULTS 5.1 Module 1: Character layer Unit Testing

interference layer

: Character Layer

Test Type

:

Purpose

: To verify the person

is

Unit Testing

legal user or not

T

4.2 Example for Background

Module Tested

Expected Behavior:

Valid or invalid

4.1.3 Foreground Interference layer:

user

Different with the background interference

Input

layer, the foreground interference is to make

Observed Behavior: Valid or invalid

the identifying characters in the character

user

incomplete,

ES

layer

: CAPTCHA code

further

increasing

difficulty of attack whether using single frame or multiple frames. Foreground interference involves character interference,

line interference and point interference. In

IJ

A

this case we combine all three together.

Priority

:

High.

Integration Testing Name

: Character Layer

Test type

:

Integration testing

Modules involved : Carousel, Carouseldata Input : CAPTCHA code Expected Results :

Valid or invalid

user Observed Results : Valid or invalid user Black box testing Input

: CAPTCHA code

Fig.4.3 Example for foreground interference

Process

:verify whether the

layer

entered code is correct or not Action

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

: blocked or verified

Page 214


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

layer For Invalid Input:

ES

T

Module 1: Character screen shots For Valid Input:

Fig.5.1 Character screenshot for valid input

layer

Fig.5.2 character layer screenshot for invalid input

Actually the code L7W5 will be in motion

Here the CAPTCHA code is “qTod” will be in motion and the user entered the code “qT “ so the code that is entered doesn’t match with CAPTCHA code. So, the user is considered as invalid user.

which here in the figure is not visible. When

A

the user enters the correct CAPTCHA code i.e “L7W5” he is considered as a valid or authorized user as shown in the above figure.

Background Interference layer

Integration Testing

IJ 5.2. Module: 2

Observed Behavior: valid or invalid user Priority : High.

Unit Testing

Module Tested : Background Interference Layer Test Type : Unit Testing Purpose : to verify whether user is authorized or not Expected Behavior: valid or invalid user Input : CAPTCHA code

ISSN: 2230-7818

Name : Background Interference Layer Test type : Integration testing Modules involved : Character Layer, Background Interference Layer.. Input : CAPTCHA code Expected Results : valid or invalid user Observed Results : valid or invalid user

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 215


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

Black box testing Input : CAPTCHA code Process : checks whether the user is authorized or not Action : valid or invalid user

T

Background Interfernce layer screen shots: For Valid Input: Fig.5.4 Background Interference layer

ES

for Invalid Input

Here the CAPTCHA code is “Y5Dn” but the user entered “yndn“ . So ,the code that is entered doesn’t match with CAPTCHA code. So, the user is considered as invalid or unauthorized

A

user.

Fig.5.3 Background Interference layer for valid input

IJ

Here the CAPTCHA code “1JUj” will be in motion.

In the second module these

characters are displayed along with noise. If the user can enter the correct code he is considered as valid user as shown in the above figure.

For Invalid Input:

5.3 MODULE 3: FOREROUND INTERFERENCE LAYER Unit Testing Module Tested : Foreground Interference Layer Test Type : Unit Testing Purpose : to verify whether user is authorized or not Expected Behavior : valid or invalid user Input : CAPTCHA code Observed Behavior : valid or invalid user Priority : High. Integration Testing

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 216


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

Name : Background Interference Layer Test type : Integration testing Modules involved : Character, BackGroundInterference,

Fig.5.5 foreground interference layer for

ForeGroundInterference Layer Input : CAPTCHA code Expected Results : valid or invalid user Observed Results : valid or invalid user

user.

the same code so he is an authorized

For Invalid Input:

ES

Input : CAPTCHA code Process : checks whether the user is authorized or not Action : valid or invalid user

Here the code is “DNF4” the user enters

T

Black box testing

valid input

Foreground Interference layer screen shots:

IJ

A

For Valid Input:

Fig.5.6 Foreground interference layer screenshot for valid input Here the user enters the code

which isn’t correct so he is considered as an unauthorized or invalid user

6. SUMMARY AND CONCLUSION 6.1 SUMMARY: CAPTCHA

is

Completely

Automated Public Turing Test to tell Computers and Human Apart. CAPTCHA is a mechanism which protects, the website registration, Email addresses from scrapers, and prevents unauthorised access, dictionary attacks, and also helps in proper functioning

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 217


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

of online polling. Of late the breaking of

background, making it still very difficult for

these CAPTCHA’s has become a major

computer programs to break even using

concern. These breaking of CAPTCHAs are

several frames. Moreover, the 3-layer

possible because of the advancements in

structure makes the design of CAPTCHA

pattern recognition tasks and Artificial

more distinct, taking on high expansibility

Intelligence. So, there is a need for the

as well as plenty of room for sustainable

development of CAPTCHA which is very

optimization.

hard

to

break.

In

our

project

we The security analysis shows that this new

CAPTCHA which is very hard to break. We

design can prevent attacks efficiently from

used the disadvantages of computers in

existing algorithms as well as possible ones

recognising

using

moving

objects.

Our

multiple

frames.

Furthermore,

transformation from 2D to 3D optimizes the

ES

CAPTCHA consists of a code which will be

T

implemented a practical 3-Layer Dynamic

visual effects, providing a new idea for the

recognise the code at the same time it’s easy

design of CAPTCHA. In short, this project

for humans to recognise it. As there are 3-

will be a good guide for the design of next

Layers the complexity of image is also more

generation CAPTCHA. Our future research

which makes it even harder for the

will be on how to design a more practical

computers to recognise the CAPTCHA

and safer 3-layer dynamic CAPTCHA and

code. We have provided authenticity feature

the improvement in performance of the

A

in motion making it hard for the computer to

using this 3-Layer Dynamic CAPTCHA. 6.2

CONCLUSION

IJ

SCOPE:

AND

FUTURE

websites

when these CAPTCHAs

used(Generally

when

type

of

CAPTCHAs are used the performance decreases as the generation requires time for

In this project we implemented a practical

execution) .

and safe 3-Layer Dynamic CAPTCHA

REFERENCES

originally bonding the biological vision

these

are

zero-

[1]. JIN Hai-kun, DU Wen-jie SHA Li-min.

knowledge theory, ensuring it not only

Research on security model with Chinese

theory

with

the

single-frame

extremely hard to recognize every single frame, but easy to identify for humans as well. It also makes full use of disadvantages

CAPTCHA

Computer Engineering and

Design, 2006.

of computers in recognizing numerous moving

ISSN: 2230-7818

objects

from

a

complicated

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 218


Ramesh Babu .A* et al / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 2, 200 - 219

[2]. Luis von Ahn, Manuel Blum, Nicholas

[9]. M. Chew and J. Tygar. Collaborative

J,

filtering CAPTCHAs. Proc. Of 2nd Int.

Hopper

and

John

Langford,The

CAPTCHA

Workshop on Human Interactive Proofs ,

Web Page: http://www.captcha.net, 2000.

vol. 3517 of Lecture Notes in Computer

[3]. Luis von Ahn, Manuel Blum and John

Science, pp. 66–81, May 2005.

Langford, Telling Humans and Computers

[10]. Lin Hongwen, Tu Dan, and Li Guohui.

Apart

Lazy

Moving Objects Detection Method Based on

Cryptographers do AI, In Communications

Statistical Background Model. Computer

of the ACM, 2004.

Engineering,Vol.29,

[4]. L. von Ahn, M. Blum, N. Hopper, and J.

September 2003 (in Chinese).

How

Langford. CAPTCHA: Using hard AI problems for security. In Proceedings of

p97-99,

ES

Eurocrypt, 2003, 2003.

No.16,

T

Automatically:

[5]. HU Jin-rong, WANG Ling. Technique

of randomized question reading CAPTCHA based on character feature . Computer Engineering and Design, 2008.

[6]. R. Datta, J. Li, and J. Z. Wang.

IMAGINATION: a robust image-based ACM

A

CAPTCHA generation system. Proc. of 13th Int.

Conf.

(MULTIMEDIA

on

05),

pp.

Multimedia 331–334,

November 2005.

IJ

[7]. J. Elson, J. R. Douceur, J. Howell, and J. Saul. ASIRRA: a CAPTCHA that exploits interest-aligned

manual

image

th

categorization. Proc. of 14 ACM Conf. on Computer and Communications Security (CCS

2007),pp.

366–374,

October

November 2007. [8]. G. Kochanski, D. Lopresti, and C. Shih. A Reverse Turing Test Using Speech. Proc. of 7th Int. Conf. on Spoken Language Processing, pp.1357–1360, September 2002.

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 219


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.