Professional Documents
Culture Documents
1. INTRODUCTION
CAPTCHA was invented in 2000 at Carnegie Mellon University
by John Langford, Nicholas J. Hooper, and Luis Von Ahn [1].
CAPTCHA is a descriptor for “Completely Automated Public Figure 1:Text-based CAPTCHA [20]
Turning Test to tell Computers and Humans Apart” [2,3]. As the
amount of information and applications grows over time, the Text-based CAPTCHA can be implemented by using various
importance of preserving security attracts more attention. There methods like Gimpy, EZ-Gimpy, and Baffle-Text [9].
are many foul users like attackers, hackers, and spammers who
want to have unauthorized access to these applications 2.1.1 Gimpy-CAPTCHA
(information), spam, hack accounts and do other maltreatment.
It is based on optical character recognition (OCR). A sequence of
CAPTCHA is used where authorized access is a special concern.
characters is presented as distorted and corrupted images by
Many web services like Yahoo, Google, Bing, etc. use CAPTCHA
adding black and white lines and making non-linear modifications.
to contrast between an authenticated user and a malicious
Users should enter the correct words that are given in the image to
program. CAPTCHAs are also used in the sites that provide access
gain access to the service. Figure 2 presents the Gimpy
to sensitive data, such as credit card accounts and banks. It acts as
CAPTCHA.
a shield that can protect websites from bots. It usually generates
and evaluates a test that is easy for humans to solve but difficult
for automaton [4]. Many different variants of CAPTCHA have
been proposed and used for various applications over the years.
The main contribution of this study is to review, classify, and
compare CAPTCHAs of different types. The rest of the paper is
organised as follows: Section 2 consists of Types of CAPTCHAs,
Section 3 and Section 4 contain Applications and Issues
respectively, Section 5 includes a Comparison Table, Conclusion
is given in Section 6, and Section 7 contains References.
1. Protecting website registration: Most of the websites, 2. Visually Impaired Visitors: Some CAPTCHAs are not
which have free registration such as email provider services, accessible by visually impaired people, thus audio
are the target of bots’ attacks that sign up for thousands of CAPTCHAs are there for Visually Impaired users [16].
email accounts [12]. It can prevent bots to access the
services and from creating multiple accounts on services like 3. Not fully bot-proof: Some of the CAPTCHA tests can be
Gmail, Hotmail, or Yahoo Mail. In general, free services fooled through the use of bots and should not be relied upon
should be protected by a CAPTCHA to prevent abuses by to protect websites.
automated scripts.
4. Traffic drop: Using CAPTCHA on websites drops the
2. Preventing False Comments: It also helps websites traffic and traffic drops leading to the loss of the owner of
prevent the posting of spammed messages or false that website.
comments. Using CAPTCHA, only humans can leave
5. COMPARISON TABLE
I. Table 1: COMPARISON BETWEEN DIFFERENT TYPES OF CAPTCHAs
[4] Ahn, L. V., Blum, M., Hopper, N. J., & Langford, J. (2003,
May). CAPTCHA: Using hard AI problems for security.
6. CONCLUSION In International conference on the theory and applications of
cryptographic techniques (pp. 294-311). Springer, Berlin,
CAPTCHA plays a very essential role in website security. It Heidelberg.
prevents bot programs and hackers from abusing online services.
This study has explored various CAPTCHA types, and their [5] Hasan, W. K. A. (2016). A survey of current research on
applications, along with their pros and cons. This study would be captcha. Int. J. Comput. Sci. Eng. Surv.(IJCSES), 7(3), 141-
highly useful to researchers who want to perform research on 157.
particular CAPTCHA techniques. Moreover, Scientists can also
select the combination of various CAPTCHA techniques that can [6] Al-Sudani, W., Gill, A., Li, C., Wang, J., & Liu, F. (2010,
be helpful in specific application areas. November). Protection through multimedia captchas.
In Proceedings of the 8th International Conference on
Advances in Mobile Computing and Multimedia (pp. 63-68).
7. REFERENCES [7] Mori, G., & Malik, J. (2003, June). Recognizing objects in
adversarial clutter: Breaking a visual CAPTCHA. In 2003
IEEE Computer Society Conference on Computer Vision
[1] Lee, W. B., Fan, C. W., Ho, K., & Dow, C. R. (2012,
and Pattern Recognition, 2003. Proceedings. (Vol. 1, pp. I-I).
November). A CAPTCHA with tips related to alphabets
IEEE.
upper or lower case. In 2012 Seventh International
Conference on Broadband, Wireless Computing,
[8] Singh, V. P., & Pal, P. (2014). Survey of different types of
Communication and Applications (pp. 458-461). IEEE.
CAPTCHA. International Journal of computer science and
information technologies, 5(2), 2242-2245.
[2] Challa, R. K. (2020, December). CAPTCHA: A Systematic
Review. In 2020 IEEE International Conference on Advent
[9] Smeulders, A. W., Worring, M., Santini, S., Gupta, A., &
Trends in Multidisciplinary Research and Innovation
Jain, R. (2000). Content-based image retrieval at the end of
(ICATMRI) (pp. 1-8). IEEE..
the early years. IEEE Transactions on pattern analysis and
machine intelligence, 22(12), 1349-1380.
[3] Pope, C., & Kaur, K. (2005). Is it human or computer?
[10] Choudhary, S., Saroha, R., Dahiya, Y., & Choudhary, S.
Defending E-commerce with Captchas. IT
(2013). Understanding CAPTCHA: text and audio based
professional, 7(2), 43-49.
CAPTCHA with its applications. International Journal of
Advanced Research in Computer Science and Software [22] https://www.researchgate.net/profile/Firkhan-Ali/
Engineering, 3(6). publication/286583881/figure/download/fig4/
AS:388247961260043@1469576935942/CAPTCHA-
[11] Jeng, A. B., Tseng, C. C., Tseng, D. F., & Wang, J. C. (2010, puzzle-based-system-on-registration-form.png
November). A study of CAPTCHA and its application to
user authentication. In International Conference on
Computational Collective Intelligence (pp. 433-440).
Springer, Berlin, Heidelberg.
[13] Pandey, Y., & Lothe, D. (2014). Evaluating the usability and
security of a spelling based CAPTCHA system. International
Journal of Computer Science and Information
Technologies, 5(3).
[15] 16. Solanki, S., Krishnan, G., Sampath, V., & Polakis, J.
(2017, November). In (cyber) space bots can hear you speak:
Breaking audio CAPTCHAs using ots speech recognition.
In Proceedings of the 10th ACM Workshop on Artificial
Intelligence and Security (pp. 69-80).
[18] Kaur, K., & Behal, S. (2014). Captcha and its techniques: a
review. International Journal of Computer Science and
Information Technologies, 5(5), 6341-6344.
[19] https://cdn.arstechnica.net/wp-content/uploads/archive/
news.media/AudioReCaptcha.png
[20] https://image.slideserve.com/270264/text-based-captchas1-
l.jpg
[21] https://www.berkeley.edu/news/media/releases/2002/12/
images/gimpy.jpg