Professional Documents
Culture Documents
Abstract—In order to distinguish between human users and CAPTCHA mechanism applications, prevailing in most
computer programs, CAPTCHA (Completely Automated login pages for users to sign up for new accounts, which
Public Turing test to tell Computers and Human Apart) could prevent spammers from using automated methods to
mechanism is widely applied in websites such as accounts register thousands of free online accounts, as shown in
application website. While the major implementation of Figure 1.
CAPTCHA method—2D still image verification code based on
OCR technology is threatened by developing artificial
intelligence and image recognition technologies. In this paper, Figure 1. Simple OCR_based CAPTHA
we propose a new approach to implement CAPTCHA
mechanism based on 3D Animation, utilizing the weakness of However, as OCR technology based on neural network
computer vision, which make it robust to computer attacks and
and artificial intelligence develops[9], the security of such
convenient for users to recognize, and implemented this
OCR-based CAPTCHA suffers more and more serious
method to generate a 3D animation verification code.
threats. Take some famous portal sites for example, Yahoo,
Keywords-CAPTCHA;VerificationCode;Moving objects; as the first user website of CAPTCHA mechanism, its
Three-dimensional Animation CAPTCHA systems used to prevent automated registration
of free Yahoo Mail accounts have been defeated by a
I. INTRODUCTION software released by a Russian researcher with the
Internet is crucial to each respect of life all over the globe recognition rate about 30%[6]. Microsoft live mail was also
nowadays, through which we could retrieve and exchange captured by the junk mail many times[7][8]. For that reason,
information freely and efficiently. Given the fundamental an increasing number of OCR-based CAPTCHA designers
relation between internet and people’ s life, vast malicious think out the solution that they add a large amount of
computer programs attack websites for profits, such as auto miscellaneous interference information into the image to
application for some mails’ accounts to send junk e-mails, reinforce verification’s robustness, which unfortunately leads
etc. CAPTCHA (Completely Automated Public Turing test difficulty for human to recognize the word, as shown in
to tell Computers and Human Apart) system emerges to Figure 2.
solve this problem by identifying end-users of internet
whether a real person or an automated computer Figure 2. Complex OCR_based CAPTCHA
program[1][2][3]. It also prevents malicious computer
program impropriating limited resources on internet and Non-OCR-based methods are based on the features of
maintains the security of internet. The key point of multimedia systems such as pictures and sounds and usually
CAPTCHA is the question that human users could get using methods like small puzzle games[4]. Such as PIX,
answers easily while the current computer programs could which ask users to select pictures of certain subject among
not afford the right answer yet. pictures of various subjects [1]. Besides this, there are a lot
CAPTCHA is first proposed by a study group of of methods, for example, CAPTCHA algorithm proposed by
Carnegie Mellon University and studied by researchers all Y. Rui is based on recognition of human face[10],
over the world after its appearance. Currently, CAPTCHA CAPTCHA technology developed by R. Datta is based on
methods are generally divided into two groups: OCR-based recognition of photos in daily life[11], CAPTCHA algorithm
methods and Non-OCR-based methods[2]. proposed by J. Elson is relied on judgment of the similarity
OCR-based methods provide images of words with of photos[12], etc.
distortion and various pictorial effects and ask users to type In this paper we propose a Non-OCR-based CAPTCHA
the words. Due to the presence of pictorial effects, computer method in the form of 3D animation and based on the
programs encounter problems in the recognition process and recognition of moving objects in videos. The rest part of this
only human users are capable of recognizing words easily. paper is organized as follows: In section 2, we analyze the
This sort of method is based on the weak points of optical crucial point of designing the new CAPTCHA mechanism
character recognition (OCR) programs that it is difficult to by concerning about the defects of current tracking moving
recognize reading texts printed with a low quality and objects methods, and then we describe the major generating
reading manuscripts[4], which brings to us possibility that step of this new CAPTCHA method. In section 3 we
certain form of images of word can be recognized only by illustrate the flow chart by implementing our method step by
human users but not by any OCR program in a certain extent. step. Section 4 concludes with a summary and comment on
Now, this kind of method has become the major pattern of future research.
180
the verification code. If they are the same, the object’s the position of elements in the matrix to the position of
changing attribute should be changed, which means that the pixels in the animation screen, in which way we can
current value of the object’s changing attribute should be determine the pixel coordinates of the verification code in
replaced by other elements except itself in the attribute’s the animation screen. For example, if the pixel coordinate in
source set randomly. the animation screen is (i, j), then the corresponding location
3. After one frame’s drawing, the drawn frame of the element in the matrix is the location of row (100-j)
number plus 1, the pixel data of this frame is reserved in the column i. As Figure 5 shows, this is number 7’s 01 matrix.
memory areas.
Step 4, we set the total number of frames of the
animation, and loop Step 3 until the drawn frame number
reaches the total number of frames of the animation. All the
pixel data of each frame is preserved in GIF format or AVI
format.
III. THE IMPLEMENTATION OF
THREE-DIMENSIONAL ANIMATION CAPTCHA
We implemented the new design utilizing VC++ and
OPENGL. We show the details in Figure 4.
181
Meanwhile, we set the rotation angle around X axis and REFERENCES
Y axis and Z axis to make the grid pattern in the animation [1] L. von Ahn,M. Blum, and J. Langford, Telling Humans and
seem like a motive wave, which makes the moving track Computers Apart Automatically, Communications of the ACM,
much more complex. February 2004, 57-60.
When this step is called the second time or more, the [2] , ,
Luis von Ahn Manuel Blum and John Langford Telling Humans
following measures should be taken. The total number of the and Computers Apart Automatically: How Lazy Cryptographers do
small quadrangles in the grid pattern, the moving track and , ,
AI In Communications of the ACM 2004.
[3] , , ,
Luis von Ahn Manuel Blum Nicholas J Hopper and John
the changing attribute set in the first frame’s drawing
remains unchanged, and the color of each quadrangle is the
,
Langford The CAPTCHA Web Page: http://www.captcha.net ,
2000.
same as the prior frame. We only should change the position [4] Mohammad Shirali-Shahreza and Sajad Shirali-Shahreza, Advanced
of each quadrangle by the moving track and the position in Collage CAPTCHA, Fifth International Conference on Information
the prior frame. Technology: New Generations, 2008, p1234-1235.
Step 4, we calculate the center point of each quadrangle [5] C Hue, JP Le Cadre, P Perez, Tracking multiple objects with particle
by the position information from Step 3 expressed in the way filtering, Aerospace and Electronic Systems, IEEE Transactions on,
of 3D coordinate(x, y, z), then change it to the 2D pixel Vol. 38, No. 3. (2002), pp. 791-812.
coordinate as ( i , j ). [6] Thomas Claburn, “Yahoo’s CAPTCHA Security Reportedly Broken”,
http://www.informationweek.com/news/internet/webdev/showArticle.
Step5, we judge the pixel coordinate of the position of jhtml?articleID=205900620..
each quadrangle’s center point whether or not in the pixel
coordinate regions of the verification code in the animation
[7] Microsoft Live Hotmail CAPTCHA-Hacked in 6 seconds ,“”
http://news.softpedia.com/news/Microsoft-Live-Hotmail-CAPTCHA-
screen. If it is, go to Step6; else, go to Step 7. Hacked-In-6-Seconds-83341.shtml.
Step 6, we change the color of the quadrangle to other [8] Yan, J. and Salah El Ahmad, A. A Low-cost Attack on a Microsoft
colors randomly, for example, if the color of the quadrangle CAPTCHA, In CCS'08. Proceedings of the 15th ACM Conference on
is red, then it may change to green or blue. Computer and Communications Security, Alexandria, Virginia, USA,
Step 7, according to the position and color of small October 27-31, 2008.
quadrangles, we draw the grid pattern in this frame. Then [9] K Chellapilla, K Larson, P Simard, M Czerwinski, Computers beat
humans at single character recognition in reading-based Human
there would be a loop, we call Step 3 to make the continuous Interaction Proofs”, 2nd Conference on Email and Anti-Spam
drawing of frames to produce an animation showing the (CEAS), 2005.
verification code in the screen. [10] Y. Rui and Z. Liu. ARTIFACIAL: Automated reverse turing test
Step 8, we record the animation for some time and using facial features. Technical Report MSRTR-2003-48, Microsoft,
reserved it as 3D animation CAPTCHA in the type of GIF, April 2003.
which would make it convenient to be utilized in the web [11] R. Datta, J. Li, and J. Z. Wang. IMAGINATION: a robust
page. image-based CAPTCHA generation system. Proc. of 13th ACM Int.
Conf. on Multimedia (MULTIMEDIA 05), pp. 331–334, November
IV. CONCLUSION 2005.
[12] J. Elson, J. R. Douceur, J. Howell, and J. Saul. ASIRRA: a
In our research, we have developed design of new CAPTCHA that exploits interest-aligned manual image categorization.
CAPTCHA and implemented it in one case. In this study we Proc. of 14th ACM Conf. on Computer and Communications Security
make our design of CAPTCHA in a new field—the (CCS 2007), pp. 366–374, October – November 2007.
recognition of moving objects, and we propose a new design [13] Gavrila D M, The visual analysis of human movement: a survey,
principle— zero knowledge per frame principle. In the field Computer Vision and Image Understanding, 1999, vol.73,p82-89.
of computer vision, the current major methods of detecting [14] Jia Deyun, Computer Vision, Beijing: Science publisher, 2000,
p26-235.
moving objects are not much practical yet, and our design
[15] Zhou Xihan, Liu Bo and Zhou HeQin, A Motion Detection Algorithm
make use of the defects of these methods to provide Based on Background Subtraction and Symmetrical Differencing,
difficulties for computer programs’ recognition of this new Computer Simulation, 2005, vol.22, p117-119.
CAPHTCHA. And the zero-knowledge per frame principle [16] McKenna S and Jabri Z Duric Z, Tracking groups of people,
makes it much more impossible for computer programs to Computer Vision and Image Understanding, 2000, vol(80), p42-56.
identify the content of CAPTCHA in each frame, so that [17] Tian Juan and Zheng Yuzheng,Application of template matching
computer programs using the OCR method which tackles technique in image recognition, Transducer and Microsystem
with current 2D still image verification code cannot solve Technologies, 2008, vol.27,p112-113.
this difficulty. [18] Xu Bo, Li Zhengming, A New Algorithm of Correlation Tracking
What’s more, this method is convenient for human to Based on Adaptive Template, Optics& Optoelectronic
Technology,2004, vol.2,p62-64.
recognize, which assures its practicality. How can make the
[19] Barron J, Feet D, Beauchemin S. Performance of optical flow
new CAPTCHA much safer to resist attacks and much easier techniques, International Journal of Computer Vision,
for human to recognize is still the main topic of our future 1994,vol.12,p43-77.
study. [20] Qin Xianxiang and Chen Hua, Amelioration of Template Matching
Arithemetic for Moving Target Recognition and Tracking, Journal of
V. ACKNOWLEDGEMENT Guangxi Academy of Sciences, 2008, vol.24, p293-295.
This work is supported by NSFC 60603012, NSFC [21] Wang Jianping, Liu Wei and Wang Jinling, A Moving Object
60703009. Detection and Recognition Method in Video Sequences, Computing
Technology and Automation, 2007, vol.26, p78-80.
182