CFP last date
22 April 2024
Reseach Article

Captcha Breaking using Segmentation and Morphological Operations

by Bandu Madar, G. Kiran Kumar, C. Ramakrishna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 4
Year of Publication: 2017
Authors: Bandu Madar, G. Kiran Kumar, C. Ramakrishna
10.5120/ijca2017914013

Bandu Madar, G. Kiran Kumar, C. Ramakrishna . Captcha Breaking using Segmentation and Morphological Operations. International Journal of Computer Applications. 166, 4 ( May 2017), 34-38. DOI=10.5120/ijca2017914013

@article{ 10.5120/ijca2017914013,
author = { Bandu Madar, G. Kiran Kumar, C. Ramakrishna },
title = { Captcha Breaking using Segmentation and Morphological Operations },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 4 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number4/27660-2017914013/ },
doi = { 10.5120/ijca2017914013 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:49.794527+05:30
%A Bandu Madar
%A G. Kiran Kumar
%A C. Ramakrishna
%T Captcha Breaking using Segmentation and Morphological Operations
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 4
%P 34-38
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Segmentation subdivides a CAPTCHA image into its constituent regions or objects. The point to which the subdivision is carried depends on the problem being solved. That is, segmentation should end when the objects of interest inan application have been isolated. Without a good segmentation algorithm, an object may never be identifiable. Image segmentation continues to be an vital and active research area in image analysis. Many techniques have been proposed to deal with the image segmentation problem. They can be broadly grouped into the following categories. Histogram-Based Techniques, Edge-Based Techniques, Region-Based Techniques, Hybrid Techniques. The accuracy of segmentation is highly dependent on the success or failure of each computerized analysis procedure. After the segmentation process is over, we should be familiar with, which pixel belongs to which object, the discontinuities where abrupt changes lie, tell us the locations of boundaries of regions. The connectedness of any two pixels is identified when there exists a connected path wholly within the set, where a connected path is a path that always moves between neighboring pixels. Therefore, region is a set of adjacent connected pixels. Extensive researches have been made in designing and creating different segmentation algorithms, however, still no algorithm is found from the researches results that can be accepted and appropriate for all kinds of images, obviously, all segmentation algorithms cannot be equally applicable to a certain application.

References
  1. D. Danchev, Google's reCAPTCHA under automatic fire from a newly launched reCAPTCHA-solving/breaking service, Internet Security Threat Updates & Insights, http://www.webroot.com/blog/2014/01/21/googles-recaptcha-automatic-fire-newly-launched-recaptcha-solving-breaking-service/〉, 2014.
  2. C. Obimbo, A. Halligan, P. De Freitas, CaptchAll: an improvement on the modern textbased CAPTCHA, J. ProcediaComput. Sci. 20 (2013) 496–501.
  3. G. Baxter Bell, Strengthening CAPTCHA-based Web security, First Monday J. 17 (2012) 2 http://firstmonday.org/ojs/index.php/fm/article/view/3630〉.
  4. S. Kulkarni, H.S. Fadewar, CAPTCHA based web security: an overview, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3 (11) (2013) 154–158 〈http://www.ijarcsse. com/docs/papers/Volume_3/11_November2013/V3I10-0379.pdf〉.
  5. M. Serrao, S. Salunke, A. Mathur, Cracking CAPTCHAS for cash: a review of CAPTCHA crackers, Int. J. Eng. Res. Technol. 2 (1) (2013) 1–5.
  6. G. Goswami, B.M. Powell, M. Vatsa, R. Singh, A. Noore, FaceDCAPTCHA: face detection based color image CAPTCHA, Futur. Gener. Comput. Syst. 31 (2014) 59–68.
  7. L.D. Priya, S Karthik, Secure captcha input based spam prevention, Int. J. Emerg. Sci. Eng. 1 (7) (2013) 9–12.
  8. S. Azad, K. Jain, CAPTCHA: attacks and weaknesses against OCR technology, Global J. Comput. Sci. Technol. Neural Artif. Intell. 13 (3) (2013) 14–18.
  9. E. Bursztein, A.Moscicki, C. Fabry, S. Bethard, J.C. Mitchell, D. Jurafsky, Easy does it: more usable CAPTCHAs, in: Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems, Canada, 2014, pp. 2637–2646, http://dx.doi.org/10.1145/2556288.2557322.
  10. C. Cruz-Perez, O. Starostenko, F. Uceda-Ponga, V. Alarcon-Aquino, L. Reyes-Cabrera, Breaking reCAPTCHAs with unpredictable collapse: heuristic character segmentation and recognition, in: J.A. Carrasco-Ochoa, J.F. Martinez-Trinidad, J.A. Overa Lopez, K. Boyer (Eds.), LNCS: Pattern Recognition, 7329, Springer-Verlag, Berlin Heidelberg, 2012, pp. 155–165.
  11. E. Bursztein, M. Matthieu, Text-based CAPTCHA strengths and weaknesses, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, IL, USA, 2011, pp. 125–138, 〈http://ly.tl/p22〉.
  12. K. Fang, Z. Bu, Z.Y. Xia, Segmentation of CAPTCHAs based on complex networks, in: J. Lei, F. Lee Wang, H. Deng, D. Miao (Eds.), LNCS: Artificial Intelligence and Computational Intelligence, 7530, 2012, pp. 735–743.
  13. E. Burzstein, H..Paskov, et. al., Science of CAPTCHAs: solvability by humans and machines, AFOSR MURI Project, 2013, pp. 1–59.
  14. Committee on Institutional Cooperation. Google Book Search Project, 2014 〈http:// www.cic.net/projects/library/book-search/introduction〉.
  15. C. Lim Tan, X. Zhang, L. Li, Image based retrieval and keyword spotting in documents, in: D. Doermann, K. Tombre (Eds.), Handbook of Document Image Processing and Recognition, Springer-Verlag, London, 2014, pp. 805–842.
  16. J. Yan, A. Salah, E. Ahmad, The robustness of a new CAPTCHA, in: 3rd Workshop on System Security, NY, USA, 2010, pp. 36–41, 〈http://doi.acm.org/ 10.1145/1752046.1752052〉.
  17. M. Wehner, Internet advertisers kill text-based CAPTCHA, 〈http://news.yahoo. com/internet-advertisers-kill-text-based-captcha-205416291.html〉, 2013.
  18. K. Kluever, R. Zanibbi, Breaking the PayPal CAPTCHA, 〈http://www.kloover. com/2008/05/12/breaking-the-paypalcom-captcha/〉, 2014 (retrieved on 25th of May).
  19. K. Dawson, Windows Live Hotmail CAPTCHA Cracked, Exploited, 〈http://tech. slashdot.org/article.pl?sid=08/04/15/1941236&from=rss〉 and Gmail CAPTCHA Cracked, 〈http://it.slashdot.org/article.pl?sid=08/02/27/0045242〉, 2014.
  20. S. Li, A. Syed, et. al., breaking e-Baking CAPTCHAs, in: Proceedings of the 26th Computer Security Applications Conference, NY, USA, 2010, pp. 171–180, 〈http://www.acsac.org/2010/openconf/modules/request.php?module=oc_program&action=summary.php&id=53〉.
  21. S. Kruglov, Defeating of weak CAPTCHAs, 〈http://www.captcha.ru/en/break ings/〉, 2013.
  22. Microsoft ASP.NET Team, Using a CAPTCHA to Prevent Bots from Using our ASP.NET Web Razor) Site, 〈http://www.asp.net/web-pages/tutorials/security/using-a-catpcha-to-prevent-automated-programs-(bots)-from-using-your-aspnet-web-site〉, 2012.
  23. S.E. Ahmad, J. Yan, M. Tayara, The Robustness of Google CAPTCHAS, Newcastle University Print, England, 2011 (Technical report).
  24. A. Baluni, S. Gole, Two-step CAPTCHA: using a simple two step turing test to differentiate between humans and bots, Int. J. Comput. Appl. 81 (16) (2013) 48–51.
  25. P. Liu, J. Shi, L. Wang, L. Guo, An efficient ellipse-shaped blobs detection algorithm for breaking facebook CAPTCHA, in: Y. Yuan, X. Wu, Y. Lu (Eds.), CCIS: Trustworthy Computing and Services, 320, Springer-Verlag, Berlin Heidelberg, 2013, pp. 420–428.
  26. D. Kapoor, H. Bangar, A. Chaurasia, A. Sethi, An ingenious technique for symbol identification from high noise CAPTCHA images, in: Proceedings of the Annual IEEE India Conference, 2012, pp. 98–103.
  27. M. Takaya, H. Kato, T. Komatsubara, Y. Watanabe, A. Yamamura, Recognition of one-stroke symbols by humans and computers, J. Procedia – Soc. Behav. Sci. 97 (6) (2013) 666–674.
  28. Preethi, Vikas,Security online Authentication using Captcha, International Journal of Advanced Research in Computer Science and Software Engineering, Volume , 5, , Issue ,6 ,June-2015.
  29. Mohammad Jabed Morshed Chowdhury, Narayan Ranjan Chakraborty, CAPTHA Based on Human Cognitive Factor, IJACSA,Vol. 4, No.11,2013
Index Terms

Computer Science
Information Sciences

Keywords

CAPTHA histogram edge-based accuracy