SlideShare une entreprise Scribd logo
1  sur  5
ACKNOWLEDGEMENT



       I would like to express my sincere gratitude and appreciation to everyone who
made this seminar report possible. Most of all, I would like to thank my Seminar
Supervisor, Mr. Amit Kumar Jaiswal, Assistant Professor, Department of Computer
Science and Engineering, Ideal Institute of Technology Ghaziabad and Ms. Sumita
Verma, Lecturer, Department of Computer Science and Engineering, Ideal Institute
of Technology Ghaziabad, for their guidance in the seminar. With their knowledge
and experience, they guided me to successfully achieve my seminar objective.

       I sincerely extend my thanks to, Dr. G. P. Govil, (Prof.) and Dr. Sudhir
Dawra, (Associate Prof. & Head) Department of Computer Science and Engineering,
Ideal Institute of Technology Ghaziabad, Uttar Pradesh for their encouragement and
support.
       I express my sincere thanks to all my friends, my well-wishers and classmates
for their support and help during the seminar report.




                                                            ABHIMANYU SOOD
                                                            Roll No. 0902810002
                                                               B. Tech. (CSE)
                                                                 3rd Year (A)




                                            iv
ABSTRACT


        We introduce captcha, an automated test that humans can pass, but current
computer programs cannot pass: any program that has high success over a captcha
can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide
several novel constructions of captchas. Since captchas have many applications in
practical security, our approach introduces a new class of hard problems that can be
exploited for security purposes. Much like research in cryptography has had a
positive impact on algorithms for factoring and discrete log, we hope that the use of
hard AI problems for security purposes allows us to advance the field of Artificial
Intelligence. We introduce two families of AI problems that can be used to construct
captchas and we show that solutions to such problems can be used for steganographic
communication. Captchas based on these AI problem families, then, imply a win-win
situation: either the problems remain unsolved and there is a way to differentiate
humans from computers, or the problems are solved and there is a way to
communicate covertly on some channels.




                                           iv
CONTENTS


    Certificate


    Acknowledgement --------------------------------------------------------------
    i


    Abstract -------------------------------------------------------------------------
    ii


    Content       -------------------------------------------------------------------------
    iii


    List of Figures------------------------------------------------------------------
    iv




1. INTRODUCTION --------------------------------------------------------------------- 1


2. TYPES OF CAPTCHAS ------------------------------------------------------------- 5


3. APPLICATION ----------------------------------------------------------------------- 12


4. CONSTRUCTING CAPTCHA -----------------------------------------------------
    15


5. BREAKING OF CAPTCHA --------------------------------------------------------
    24


6. ISSUES WITH CAPTCHA --------------------------------------------------------- 30



                                                iv
Conclusion ------------------------------------------------------------------- 33


    Reference      ---------------------------------------------------------------------
    34




                               List of Figures



1. Fig 2.1 Gimpy CAPTCHA ------------------------------------------------------------
    6

2. Fig 2.2 Yahoo’s Ez – Gimpy CAPTCHA -------------------------------------------
    6

3. Fig 2.3 BaffleText examples ----------------------------------------------------------
    7

4. Fig 2.4 MSN Passport CAPTCHA ---------------------------------------------------
    7

5. Fig 2.5 Bongo CAPTCHA ------------------------------------------------------------
    8

6. Fig 2.6 First line shows ---------------------------------------------------------------
    11

7. Fig 5.1 Breaking CAPTCHAs -------------------------------------------------------
    27

8. Fig 6.1 Usability issues in text based CAPTCHAs -------------------------------
    30




                                              iv
iv

Contenu connexe

Similaire à CAPTCHA2

IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Development of Multivariable Control Systems Rev 200
Development of Multivariable Control Systems Rev 200Development of Multivariable Control Systems Rev 200
Development of Multivariable Control Systems Rev 200Maung Maung Latt
 
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice RecognitionIRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice RecognitionIRJET Journal
 
Rhea stadick thesis 12 05
Rhea stadick thesis 12 05Rhea stadick thesis 12 05
Rhea stadick thesis 12 05bhabadvm
 
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET Journal
 
Siemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-eSiemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-eDien Ha The
 
AUTOMATIC DETECTION OF OVERSPEED VEHICLE
AUTOMATIC DETECTION OF OVERSPEED VEHICLEAUTOMATIC DETECTION OF OVERSPEED VEHICLE
AUTOMATIC DETECTION OF OVERSPEED VEHICLEIRJET Journal
 
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...IRJET Journal
 
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEM
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEMMETAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEM
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEMIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
Three-Axis Auto Stabilizing Video Camera Platform
Three-Axis Auto Stabilizing Video Camera PlatformThree-Axis Auto Stabilizing Video Camera Platform
Three-Axis Auto Stabilizing Video Camera PlatformEklavya Sharma
 
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...IRJET Journal
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for AnimationIRJET Journal
 
IRJET- Automatic Gold Sphere Drill Machine
IRJET- Automatic Gold Sphere Drill MachineIRJET- Automatic Gold Sphere Drill Machine
IRJET- Automatic Gold Sphere Drill MachineIRJET Journal
 
Design and Implementation of Faster and Low Power Multipliers
Design and Implementation of Faster and Low Power MultipliersDesign and Implementation of Faster and Low Power Multipliers
Design and Implementation of Faster and Low Power MultipliersIRJET Journal
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and TravelsIRJET Journal
 

Similaire à CAPTCHA2 (20)

IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
MS-08 Jan June 2017
MS-08 Jan June 2017MS-08 Jan June 2017
MS-08 Jan June 2017
 
Development of Multivariable Control Systems Rev 200
Development of Multivariable Control Systems Rev 200Development of Multivariable Control Systems Rev 200
Development of Multivariable Control Systems Rev 200
 
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice RecognitionIRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
 
Rhea stadick thesis 12 05
Rhea stadick thesis 12 05Rhea stadick thesis 12 05
Rhea stadick thesis 12 05
 
Project report1
Project report1Project report1
Project report1
 
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification System
 
Siemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-eSiemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-e
 
Project_Report_Masters
Project_Report_MastersProject_Report_Masters
Project_Report_Masters
 
AUTOMATIC DETECTION OF OVERSPEED VEHICLE
AUTOMATIC DETECTION OF OVERSPEED VEHICLEAUTOMATIC DETECTION OF OVERSPEED VEHICLE
AUTOMATIC DETECTION OF OVERSPEED VEHICLE
 
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
 
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEM
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEMMETAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEM
METAL PRODUCTS DESIGN AND FABRICATION OF SMART SHELF SYSTEM
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Three-Axis Auto Stabilizing Video Camera Platform
Three-Axis Auto Stabilizing Video Camera PlatformThree-Axis Auto Stabilizing Video Camera Platform
Three-Axis Auto Stabilizing Video Camera Platform
 
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for Animation
 
IRJET- Automatic Gold Sphere Drill Machine
IRJET- Automatic Gold Sphere Drill MachineIRJET- Automatic Gold Sphere Drill Machine
IRJET- Automatic Gold Sphere Drill Machine
 
SMART LATHE MACHINE
SMART LATHE MACHINESMART LATHE MACHINE
SMART LATHE MACHINE
 
Design and Implementation of Faster and Low Power Multipliers
Design and Implementation of Faster and Low Power MultipliersDesign and Implementation of Faster and Low Power Multipliers
Design and Implementation of Faster and Low Power Multipliers
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and Travels
 

Plus de Abhimanyu Sood

Plus de Abhimanyu Sood (6)

Web analytics
Web analyticsWeb analytics
Web analytics
 
Bug XTracker Report
Bug XTracker ReportBug XTracker Report
Bug XTracker Report
 
Bug x tracker
Bug x trackerBug x tracker
Bug x tracker
 
Report1
Report1Report1
Report1
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

CAPTCHA2

  • 1. ACKNOWLEDGEMENT I would like to express my sincere gratitude and appreciation to everyone who made this seminar report possible. Most of all, I would like to thank my Seminar Supervisor, Mr. Amit Kumar Jaiswal, Assistant Professor, Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad and Ms. Sumita Verma, Lecturer, Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad, for their guidance in the seminar. With their knowledge and experience, they guided me to successfully achieve my seminar objective. I sincerely extend my thanks to, Dr. G. P. Govil, (Prof.) and Dr. Sudhir Dawra, (Associate Prof. & Head) Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad, Uttar Pradesh for their encouragement and support. I express my sincere thanks to all my friends, my well-wishers and classmates for their support and help during the seminar report. ABHIMANYU SOOD Roll No. 0902810002 B. Tech. (CSE) 3rd Year (A) iv
  • 2. ABSTRACT We introduce captcha, an automated test that humans can pass, but current computer programs cannot pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems for security purposes allows us to advance the field of Artificial Intelligence. We introduce two families of AI problems that can be used to construct captchas and we show that solutions to such problems can be used for steganographic communication. Captchas based on these AI problem families, then, imply a win-win situation: either the problems remain unsolved and there is a way to differentiate humans from computers, or the problems are solved and there is a way to communicate covertly on some channels. iv
  • 3. CONTENTS Certificate Acknowledgement -------------------------------------------------------------- i Abstract ------------------------------------------------------------------------- ii Content ------------------------------------------------------------------------- iii List of Figures------------------------------------------------------------------ iv 1. INTRODUCTION --------------------------------------------------------------------- 1 2. TYPES OF CAPTCHAS ------------------------------------------------------------- 5 3. APPLICATION ----------------------------------------------------------------------- 12 4. CONSTRUCTING CAPTCHA ----------------------------------------------------- 15 5. BREAKING OF CAPTCHA -------------------------------------------------------- 24 6. ISSUES WITH CAPTCHA --------------------------------------------------------- 30 iv
  • 4. Conclusion ------------------------------------------------------------------- 33 Reference --------------------------------------------------------------------- 34 List of Figures 1. Fig 2.1 Gimpy CAPTCHA ------------------------------------------------------------ 6 2. Fig 2.2 Yahoo’s Ez – Gimpy CAPTCHA ------------------------------------------- 6 3. Fig 2.3 BaffleText examples ---------------------------------------------------------- 7 4. Fig 2.4 MSN Passport CAPTCHA --------------------------------------------------- 7 5. Fig 2.5 Bongo CAPTCHA ------------------------------------------------------------ 8 6. Fig 2.6 First line shows --------------------------------------------------------------- 11 7. Fig 5.1 Breaking CAPTCHAs ------------------------------------------------------- 27 8. Fig 6.1 Usability issues in text based CAPTCHAs ------------------------------- 30 iv
  • 5. iv