Advanced CAPTCHA technique using Hand Gesture based on SIFT

International Journal of Computer Applications
© 2011 by IJCA Journal
Number 1 - Article 1
Year of Publication: 2011
G.Kalyan Raju
Dr. Koduganti Venkata Rao

B.Srinivas, G.Kalyan Raju and Dr. Koduganti Venkata Rao. Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT. International Journal of Computer Applications 31(11):16-22, October 2011. Full text available. BibTeX

	author = {B.Srinivas and G.Kalyan Raju and Dr. Koduganti Venkata Rao},
	title = {Article:Advanced CAPTCHA technique using Hand Gesture based on SIFT},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {31},
	number = {11},
	pages = {16-22},
	month = {October},
	note = {Full text available}


CAPTCHA is widely used security technique employed to avoid automated form submissions or verify user as human. An alternative CAPTCHA method based on pattern matching and number recognition ability is proposed in this paper, which verifies user as human and prevents bots to intervene and spam applications or services. This method is based on user gestures which make it unique and secure. The biggest advantage of this new CAPTCHA technique is that it is simple and easy task conducted by user as it is language independent. It generates a random 4 character string number and shown to user. User should show gesture of particular characters in an order using computer webcam or using a mobile phone. A pattern matching algorithm is applied on those user images to identify gestures, and find matching. This method is very difficult to hack because designing a bot to identify gesture in image is not possible for now. Many experiments we conducted to prove accuracy of our technique.


  • L.v. Ahn, M. Blum, J. Langford, “Telling Humans and Computers Apart Automatically”, Communications of the ACM available February 2004.
  • M. Chew and H. Baird. Baffletext: A human interactive proof. Proc. SPIE-IST Electronic Imaging, Document Recognition and Retrieval, pages 305–316, January 2003.
  • S. Belongie, J. Malik, and J. Puzicha. Matching shapes. Proc. The Eighth IEEE International Conference on Computer Vision, 1:454–461, July 2001.
  • M. Blum, L. von Ahn, J. Langford, and N. Hopper. The captcha project: Completely automatic public turing test to tell computers and humans apart. , November 2000.
  • M. Atallah, Y. Genin, and W. Szpankowski, “Pattern matching Image compression: Algorithmic and empirical results,” IEEE Trans. Pattern Anal. Machine Intell., vol. 21, pp. 614–627, 1999.
  • G. Kim and V. Govindaraju. A lexicon driven approach to handwritten word recognition for real-time applications. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):366–379, 1997.
  • G. Kim and V. Govindaraju. A lexicon driven approach to handwritten word recognition for real-time applications. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):366–379, 1997.
  • Y. Cui and J. J. Weng, “Hand Segmentation Using Learning-Based Prediction and Verification for Hand Sign Recognition,” Proc. Int’l Conf. Automatic Face and Gesture Recognition, Killington, Vt., pp. 88-93, Oct. 1996.
  • T. Starner, J. Weaver and A. Pentland, “A wearable computer based American Sign Language recognizer,” Proc. IEEE Symp. International Symposium on Wearable Computers (ISWC 97), IEEE Press, Oct.1997, pp. 130-137.
  • B. Dorner, “Hand shape identification and tracking for sign language interpretation,” IJCAI Workshop on Looking at People, 1993.
  • H. Bunke and W. P. Handbook of Character Recognition and Document Image Analysis. World Scientific, 1997.
  • Ritendra Datta, Jia Li, and James Wang. IMAGINATION:A Robust Image-based CAPTCHA Generation System.Proceedings of the 13th annual ACM internationalconference on Multimedia, 2005
  • Greg Mori and Jitendra Malik. Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In Computer Vission and Pattern Recognition, 2003.
  • Andy Schlaikjer, A Dual-Use Speech CAPTCHA: Aiding Visually Impaired Web Users While Providing Transcriptions and Audio Streams. CMU-LTI-07-014.
  • ReCAPTCHA:Stop Spam Read Books (2007), Retrieved on May 7, 2011 at
  • BBC news PC stripper helps spam to spread. http://
  • Ticketmaster, LLC v. RMG Technologies, Inc., et al 507 F.Supp.2d 1096 (C.D. Ca., October 16, 2007).
  • E. Bursztein, S. Bethard, J. C. Mitchell, D. Jurafsky, and C. Fabry. How good are humans at solving CAPTCHAs? a large scale evaluation. In IEEE S&P ’10, 2010.
  • M. Chew and D. Tygar. Image recognition CAPTCHAs. In Information Security, 7th International Conference, ISC 2004, pages 268–279. Springer, 2004.
  • J. Elson, J. R. Douceur, J. Howell, and J. Saul. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In CCS ’07, pages 366–374, New York, NY, USA, 2007. ACM.
  • C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. M´ehes. Can You Infect Me Now? Malware Propagation in Mobile Phone Networks. In Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., Nov. 2007.
  • A. Hindle, M. W. Godfrey, and R. C. Holt. Reverse Engineering CAPTCHAs. In Proc. of the 15th Working Conference on Reverse Engineering, pages 59–68, 2008.
  • L. Jassin-O’Rourke Group. Global Apparel Manufacturing Labor Cost Analysis 2008. GlobalApparelLaborCostSummary2008.pdf, 2008.
  • R. F. Jonell Baltazar, Joey Costoya. The heart of KOOBFACE: C&C and social network propagation., October 2009.