CFP last date
22 April 2024
Reseach Article

Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT

by B.Srinivas, G.Kalyan Raju, Dr. Koduganti Venkata Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 31 - Number 11
Year of Publication: 2011
Authors: B.Srinivas, G.Kalyan Raju, Dr. Koduganti Venkata Rao
10.5120/3940-5531

B.Srinivas, G.Kalyan Raju, Dr. Koduganti Venkata Rao . Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT. International Journal of Computer Applications. 31, 11 ( October 2011), 16-22. DOI=10.5120/3940-5531

@article{ 10.5120/3940-5531,
author = { B.Srinivas, G.Kalyan Raju, Dr. Koduganti Venkata Rao },
title = { Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 31 },
number = { 11 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume31/number11/3940-5531/ },
doi = { 10.5120/3940-5531 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:17:53.648090+05:30
%A B.Srinivas
%A G.Kalyan Raju
%A Dr. Koduganti Venkata Rao
%T Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT
%J International Journal of Computer Applications
%@ 0975-8887
%V 31
%N 11
%P 16-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

CAPTCHA is widely used security technique employed to avoid automated form submissions or verify user as human. An alternative CAPTCHA method based on pattern matching and number recognition ability is proposed in this paper, which verifies user as human and prevents bots to intervene and spam applications or services. This method is based on user gestures which make it unique and secure. The biggest advantage of this new CAPTCHA technique is that it is simple and easy task conducted by user as it is language independent. It generates a random 4 character string number and shown to user. User should show gesture of particular characters in an order using computer webcam or using a mobile phone. A pattern matching algorithm is applied on those user images to identify gestures, and find matching. This method is very difficult to hack because designing a bot to identify gesture in image is not possible for now. Many experiments we conducted to prove accuracy of our technique.

References
  1. L.v. Ahn, M. Blum, J. Langford, “Telling Humans and Computers Apart Automatically”, Communications of the ACM available http://www.CAPTCHA.net/CAPTCHA_cacm.pdf. February 2004.
  2. M. Chew and H. Baird. Baffletext: A human interactive proof. Proc. SPIE-IST Electronic Imaging, Document Recognition and Retrieval, pages 305–316, January 2003.
  3. S. Belongie, J. Malik, and J. Puzicha. Matching shapes. Proc. The Eighth IEEE International Conference on Computer Vision, 1:454–461, July 2001.
  4. M. Blum, L. von Ahn, J. Langford, and N. Hopper. The captcha project: Completely automatic public turing test to tell computers and humans apart. http://www.captcha.net , November 2000.
  5. M. Atallah, Y. Genin, and W. Szpankowski, “Pattern matching Image compression: Algorithmic and empirical results,” IEEE Trans. Pattern Anal. Machine Intell., vol. 21, pp. 614–627, 1999.
  6. G. Kim and V. Govindaraju. A lexicon driven approach to handwritten word recognition for real-time applications. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):366–379, 1997.
  7. G. Kim and V. Govindaraju. A lexicon driven approach to handwritten word recognition for real-time applications. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):366–379, 1997.
  8. Y. Cui and J. J. Weng, “Hand Segmentation Using Learning-Based Prediction and Verification for Hand Sign Recognition,” Proc. Int’l Conf. Automatic Face and Gesture Recognition, Killington, Vt., pp. 88-93, Oct. 1996.
  9. T. Starner, J. Weaver and A. Pentland, “A wearable computer based American Sign Language recognizer,” Proc. IEEE Symp. International Symposium on Wearable Computers (ISWC 97), IEEE Press, Oct.1997, pp. 130-137.
  10. B. Dorner, “Hand shape identification and tracking for sign language interpretation,” IJCAI Workshop on Looking at People, 1993.
  11. H. Bunke and W. P. Handbook of Character Recognition and Document Image Analysis. World Scientific, 1997.
  12. Ritendra Datta, Jia Li, and James Wang. IMAGINATION:A Robust Image-based CAPTCHA Generation System.Proceedings of the 13th annual ACM internationalconference on Multimedia, 2005
  13. Greg Mori and Jitendra Malik. Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In Computer Vission and Pattern Recognition, 2003.
  14. Andy Schlaikjer, A Dual-Use Speech CAPTCHA: Aiding Visually Impaired Web Users While Providing Transcriptions and Audio Streams. CMU-LTI-07-014. http://www.lti.cs.cmu.edu/
  15. ReCAPTCHA:Stop Spam Read Books (2007), Retrieved on May 7, 2011 at http://recaptcha.net/
  16. BBC news PC stripper helps spam to spread. http:// news.bbc.co.uk/2/hi/technology/7067962.stm.
  17. Ticketmaster, LLC v. RMG Technologies, Inc., et al 507 F.Supp.2d 1096 (C.D. Ca., October 16, 2007).
  18. E. Bursztein, S. Bethard, J. C. Mitchell, D. Jurafsky, and C. Fabry. How good are humans at solving CAPTCHAs? a large scale evaluation. In IEEE S&P ’10, 2010.
  19. M. Chew and D. Tygar. Image recognition CAPTCHAs. In Information Security, 7th International Conference, ISC 2004, pages 268–279. Springer, 2004.
  20. J. Elson, J. R. Douceur, J. Howell, and J. Saul. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In CCS ’07, pages 366–374, New York, NY, USA, 2007. ACM.
  21. C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. M´ehes. Can You Infect Me Now? Malware Propagation in Mobile Phone Networks. In Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., Nov. 2007.
  22. A. Hindle, M. W. Godfrey, and R. C. Holt. Reverse Engineering CAPTCHAs. In Proc. of the 15th Working Conference on Reverse Engineering, pages 59–68, 2008.
  23. L. Jassin-O’Rourke Group. Global Apparel Manufacturing Labor Cost Analysis 2008. http://www.tammonline.com/files/ GlobalApparelLaborCostSummary2008.pdf, 2008.
  24. R. F. Jonell Baltazar, Joey Costoya. The heart of KOOBFACE: C&C and social network propagation. http://us.trendmicro.com/us/trendwatch/research-and-analysis/white-papers-and-articles/, October 2009.
Index Terms

Computer Science
Information Sciences

Keywords

CAPTCHA Hand Gesture Security SIFT Key Points reCAPTCHA