CAPTCHA: using hard AI problems for security
Luis von Ahn,Manuel Blum,Nicholas Hopper,John Langford +3 more
- pp 294-311
Reads0
Chats0
TLDR
This work introduces captcha, an automated test that humans can pass, but current computer programs can't pass; any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem; and provides several novel constructions of captchas, which imply a win-win situation.Abstract:
We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems for security purposes allows us to advance the field of Artificial Intelligence. We introduce two families of AI problems that can be used to construct captchas and we show that solutions to such problems can be used for steganographic communication. captchas based on these AI problem families, then, imply a win-win situation: either the problems remain unsolved and there is a way to differentiate humans from computers, or the problems are solved and there is a way to communicate covertly on some channels.read more
Citations
More filters
Dissertation
New Approaches to Mitigate Network Denial-of-Service Problems
TL;DR: Boldizsár et al. as discussed by the authors declare that this Ph.D. dissertation was made by themselves, and only used the sources given at the end, and every part that was quoted word-for-word, or was taken over with the same content, they noted explicitly by giving the reference of the source.
Dissertation
Tamper-resilient methods for web-based open systems
Ling Liu,James Caverlee +1 more
TL;DR: A set of techniques for reducing the opportunities of attackers to corrupt Web-based categorization and integration services, which are especially important for organizing and making accessible the large body of Web-enabled databases on the Deep Web that are beyond the reach of traditional Web search engines are introduced.
Book ChapterDOI
Segmentation of CAPTCHAs based on complex networks
Kun Fang,Zhan Bu,Zhengyou Xia +2 more
TL;DR: A Community Divided Model algorithm is proposed which based on complex networks to segment these CAPTCHAs and showed that the proposed algorithm is effective to segment two or more connected and distored characters.
Posted Content
Cryptography Using CAPTCHA Puzzles.
TL;DR: In this article, the authors explore various ways to formally model Captcha puzzles and their human component and explore new applications for Captcha, including using it to learn a machine's secret internal state.
Proceedings ArticleDOI
An Improved Adaptive Noise Reduction for Secured CAPTCHA
TL;DR: Algorithm for adaptive noise reduction from Audio based CAPTCHA is addressed and thus in turn help to determine strength ofCAPTCHA.
References
More filters
Journal ArticleDOI
Telling humans and computers apart automatically
TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Proceedings ArticleDOI
Securing passwords against dictionary attacks
Benny Pinkas,Tomas Sander +1 more
TL;DR: The key idea is to efficiently combine traditional password authentication with a challenge that is very easy to answer by human users, but is (almost) infeasible for automated programs attempting to run dictionary attacks.
Patent
Method for selectively restricting access to computer systems
TL;DR: In this paper, a computerized method selectively accepts access requests from a client computer connected to a server computer by a network is proposed, where the server computer receives an access request from the client computer and generates a predetermined number of random characters.
Journal ArticleDOI
Pessimal print: a reverse Turing test
TL;DR: This work proposes a variant of the Turing test using pessimal print: that is, low-quality images of machine-printed text synthesized pseudo-randomly over certain ranges of words, typefaces, and image degradations and shows experimentally that judicious choice of these ranges can ensure that the images are legible to human readers but illegible to several of the best present-day optical character recognition (OCR) machines.
Book ChapterDOI
Provably Secure Steganography
TL;DR: In this article, the authors introduce definitions based on computational indistinguishability and prove that the existence of one-way functions implies secure steganographic protocols, and they also prove that secure protocols can be constructed from a complexity-theoretic point of view.