New Semantic Image CAPTCHA Design
New Semantic Image CAPTCHA Design
Information Security
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76)
[Link]
ARTICLE I N F O. ABSTRACT
Article history:
Received: 8 December 2011 As protection of web applications are getting more and more important every
Revised: 23 March 2012 day, CAPTCHAs are facing booming attention both by users and designers.
Accepted: 24 January 2012 Nowadays, it is well accepted that using visual concepts enhance security and
Published Online: 11 July 2012
usability of CAPTCHAs. There exist few major different ideas for designing
Keywords: image CAPTCHAs. Some methods apply a set of modifications such as rotations
SEIMCHA, Semantic Image to the original image saved in the data base, to make the CAPTCHA more
CAPTCHA, Geometric secure.
Transformation, Upright
Orientation, Tagging Image In this paper, two different approaches for designing image based CAPTCHAs
CAPTCHA, Random Guessing. are introduced. The first one—which is called Tagging image CAPTCHA—is
based on pre-tagged images, using geometric transformations to increase secu-
rity, and the second approach tries to enhance the first one by eliminating the
use of tags and relying on semantic visual concepts. In fact, recognition of up-
right orientation is used as a visual cue. The usability of the proposed approaches
is verified using human subjects. An estimation of security is also obtained by
different kinds of attacks. Further studies are done on the proposed transforma-
tions and also on the properness of each original image for each approach. Re-
sults suggest a practical Semantic Image CAPTCHA which is usable and secure
compared to its peers.
c 2012 ISC. All rights reserved.
ISeCure
64 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 65
(a) Assira CAPTCHA system (b) Collage CAPTCHA (c) 2D CAPTCHAs from 3D
models
Tagging CAPTCHA systems are difficult since users We have extended the proposed Tagging CAPTCHA
require a priori knowledge of the image tags and it is based on upright orientation concept and designed a
a language-dependent method. In addition, Machine’s novel semantic image CAPTCHA named SEIMCHA
weakness in automatic tagging, not only counted as an in which the user should click on the upper area of
advantage for designers since bots cannot attack easily, the transformed image. This is the first time that
but also is a disadvantage too as a wide range of reliable geometric transformations and upright orientation
labels that are not available for most images on the concept are applied to design a CAPTCHA system.
web to create a random challenge. So as addressed in This combination leads to a more secure and more
[5] there are some common techniques used to gather usable CAPTCHA.
proper labels for images:
Section 2 introduces related works containing prior
(1) Using the label assigned to an image by a search tagging CAPTCHAs and upright orientation based
engine, CAPTCHAs. In Section 3, the proposed Tagging
(2) Using the context of the page to determine a CAPTCHA is described. Furthermore it presents all
label, applied transformations including geometric functions,
(3) Using images that were labeled when they were Also security and usability analysis on the proposed
encountered in a different task, or Tagging CAPTCHA are described in this section. Sec-
(4) Using games to extract the labels from users tion 4 presents SEIMCHA based on upright orienta-
(such as the ESP game). tion and geometric transformations and includes all
security and usability analysis. In Section 5, we make
It is obvious that there are some limitations to ob-
some comparisons between the proposed methods and
tain labels in these methods since asking user to solve
similar works. Finally, Section 6 is conclusion and
tagging CAPTCHA system. Noisy labels, unreliable
suggested future works.
and unrelated labels, misspelling, synonymous words,
linguistics problems and etc, are the main obstacles
of these methods.
2 Related Works
One way to escape tagging CAPTCHAs is to apply
Since this paper introduces two separated CAPTCHA
semantic content in images. Semantic cues could be
systems—the Tagging CAPTCHA and SEIMCHA-
identified by users instead of selecting and/or mapping
related work falls into two main groups. The former in-
tags. It is a new solution in which limited CAPTCHAs
troduces some non-semantic image based CAPTCHAs
applied it so far. Upright orientation of an image is
from different level of distortion on images and the
a semantic which is easy for human to comprehend
latter group contains all previous works have been
and hard for machine. Currently, automatic detection
done based on upright orientation.
of such concepts is possible only for a small subset
of images [12, 13].As reported in [5] 68.75% of users There are various CAPTCHAs from basic to ad-
preferred rotating images as CAPTCHA, and 31.25% vanced which uses images without any changes, few
of users preferred deciphering text. So it seems that changes and sophisticated ones. Microsoft Assira is
upright concept of an image is a potential choice to a famous example of these CAPTCHAs in which the
use as CAPTCHA. There are a few works based on user must choose cats in a 12 image set of cats and
this idea which will be explained in next section. dogs [7]. Figure 2a shows a screen shot of Assira. Col-
ISeCure
66 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 67
(a) Input image (b) Rotated image with (a) Input image (b) Output instances
extra margin (the square
in center is imaginary) Figure 7. Input image and final warped images
ISeCure
68 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 69
ISeCure
70 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
(a) Main subject on the side (b) Multiple concept (c) Repetitive image
4 SEIMCHA
From previous section, we found geometric transfor-
mations as a potential solution to use in a more prac-
tical CAPTCHA which is more usable and secure. It (a) Input image (b) Key image
is undeniable that increasing round number to im-
prove security decreases usability because of longer
response time. Furthermore, the proposed Tagging
CAPTCHA suffers from the general problems of the
other tagging CAPTCHAs. Today users look forward
to faster response mechanism to pass CAPTCHAs.
Based on the previous works on upright orientation
CAPTCHAs, we found this concept appropriate for (c) Examples of main output images and key output images
designing more secure and usable CAPTCHAs. In
this section we present SEIMCHA as a new semantic Figure 12. main and key images
image CAPTCHA which is a combination of upright
orientation concept and geometric transformations.
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 71
ISeCure
72 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
0.9
0.85
(a) (b) (c) (d) 0.8
Success Rate
0.75
Figure 17. Example of unusable images 0.7
0.65
Table 4. Usability of 3D objects (Failure Rate) 0.6
0.55
Number 1 2 3 4 5 6 0.5
1 2 3 4 5 6 7 8 9 10 11 12
3D object Expiration Time
Success Rate and Response Time Table 5 shows 4.5 Security Analysis
SEIMCHA results for 4 modes. These results are before
filtering input image database of difficult images for We discussed 3 types of attacks before. The probability
human. of random guessing—as the first attack—is reported
in Table 7 for SEIMCHA. A final image contains
As we discussed in the previous section, some images some white margins between 30% and 80%, and in
are not appropriate to be applied in SEIMCHA. We average about 50%. An attacker could perform some
can remove hard images from database. Figure 18 preprocessing to click on a colorful point of image. As
shows the effect of removing hard images on general discussed before, we adjust the minimum margin of
failure rate and remained images rate in database correct answer to 20% of whole image (colorful parts).
when SEIMCHA works with two heuristics. Random guessing success rate could be improved by
As it is shown in Figure 18, we can remove the images decreasing the minimum margin of correct answer
with 25% failure rate and also more. General failure area.
rate of SEIMCHA will decrease to 10% and it means This probability is for one image per test. A SEIM-
that success rate increases to almost 90%. However in
this case, we have to remove 55% of all input images Table 6. Response time
Table 5. Failure rate of SEIMCHA before filtering input images SEIMCHA Without H1 H2 H1 and
mode heuristics H2
SEIMCHA Without H1 H2 H1 and
All 4.18 s 4.11 s 4.02 s 4.03 s
mode heuristics H2
challenges
Failure rate 39% 34% 26% 25%
Success 3.87 s 3.87 s 3.79 s 3.81 s
Success rate 61% 66% 74% 75% challenges
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 73
Table 7. Random guess attack probability further experiments to compare these works.
SEIMCHA mode Without H1 H2 H1 and 5.1 Usability Metrics and Security Metrics
heuristic H2
Percentage of answer 12.32% 13.5% 17.4% 17.5% Unfortunately, there are no response time and success
area without any rate for Collage and 2D CAPTCHAs from 3D models
preprocessing [9, 14]. Assira has 83.4% success rate and 15 seconds
Percentage of answer 24.62% 27.11% 34.79% 35.05% for selecting 6 images out of 12 in one round. And if
area with the challenge repeats 3 times these numbers go up to
preprocessing 99.96% and 45 seconds respectively [7]. Again there is
no response time for What’s Up but it is 35 seconds for
CHA system which displayed 8 images would achieve 10 images in Sketcha. Success rate is 84% for 3 images
a guess success rate of less than 0.7 × 10−6 %. in What’s UP and 88% in Sketcha [3, 5]. Finally in
this work, users are successful is just over 91% and
The second attack is direct matching. As we cal-
in about 6 seconds in Tagging CAPTCHA and about
culated in Tagging image CAPTCHA, an attacker
90% and in 4 seconds for SEIMCHA.
should perform 16.8 × 1012 operations on it. When
heuristics are applied in SEIMCHA, about 20% of Also random guessing attack in Assira is 0.39% for
images will be removed. So, the needed operations 8 and 0.024% for 12 images. This is about 16% for
are 13.44 × 1012 which is a considerable time and is a Collage while it is about 3.3% for 2D CAPTCHAs
great deal for the attacker. from 3D models and the proposed Tagging CAPTCHA
for 1 image. It is 25% for 1 image in Sketcha and
And finally, the third kind of attacks are machine
it decreases to 0.001% for 8 images. The probability
learning based ones which use some learning methods
of random guessing is 4.44% for 1 image in What’s
to act like a human to answer the challenge in the
UP and again it reduces to 0.009% for 3 images. And
CAPTCHA. Fortunately, using geometric transfor-
finally, it is 17.5% for the proposed SEIMCHA system
mation functions distorts topology of point features
based on the statistics in the log database.
and the shapes in the image which are two common
ways to learning an image [17, 18]. In addition, adding One of the most important things makes a
upright orientation concept makes SEIMCHA more CAPTCHA system interesting to users is its response
difficult for machine since it should identify top part mechanism. Assira and Collage are interesting since
of an image more than recognizing the content of it in their GUI provide users a single click mechanism. But
the form of a label. However, it is important to notice 2D CAPTCHAs from 3D models and the proposed
that we didn’t design any special machine learning Tagging CAPTCHA are weak in this property because
system to pass SEIMCHA and we just discussed the they ask user to search in a list for the proper label.
strength of the proposed approaches in theory. Trying User’s response type of What’s Up is image rotation
to design such attack systems would be interesting as using slider or mouse movement or up-down control.
another point for future works. Sketcha requires the user to rotate each image in a set
of drawing until everyone is upright, by clicking to
turn them 90 degrees at a time. These tasks need more
5 Comparison time than a single click on the image which is provided
in SEIMCHA. Table 8 summarizes these comparisons.
As it mentioned in Section 2, there are some
CAPTCHA systems using other transformations. 2
more similar works are Collage [8] and 2D CAPTCHAs 5.2 Further Experiments
from 3D models [9]. The former only uses rotations, It is possible to automatically identify the images by
but the latter changed the color, light and some using reverse indexing image search engines like Tin-
other distortions on images. In addition, we intro- [Link]. If we want to categorize it as an attack, it is
duced Assira as one of the most famous image based a kind of direct matching. TinEye finds exact and al-
CAPTCHA systems which ask user to recognize cats tered copies of the images that you submit, including
and dogs [7]. Also What’s Up [5] and Sketcha [3] are those that have been cropped, color adjusted, resized,
two main CAPTCHAs asking user to identify upright heavily edited or slightly rotated [19]. Indeed, TinEye
orientation of images. What’s Up displayed input produces a digital signature of finger print for submit-
images with random rotations and Sketcha shows line ted image and compare it with all finger prints of saved
drawing images rendered from 3D models. In this images. We examined the strength of TinEye to find
section, we aim to discuss usability metrics and secu- rotated images. In this experiment, a rotated image
rity metrics for these CAPTCHAs and the proposed in the range of [-20, 20] was submitted to [Link]
CAPTCHAs. Then, we present some interesting
ISeCure
74 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
Figure 20. Identification rate by [Link] based on rotation Figure 21. Identification rate by [Link] based on bright-
rate ness rate
ISeCure
September 2012, Volume 4, Number 1 (pp. 63–76) 75
of input images, SEIMCHA has an excellent response Persian/arabic baffletext captcha. Journal of
time and success rate which is about 4 second per universal computer science, 12(12):1783–1796,
each image and about 90%, respectively. This gives 2006.
the confidence to extend the proposed approaches. [7] J. Elson, J.R. Douceur, J. Howell, and J. Saul.
Asirra: a captcha that exploits interest-aligned
As future works, we suggest below:
manual image categorization. CCS, 7:366–374,
• Using more mathematical functions for transform- 2007.
ing images and exploiting the best set of them. [8] R. Soni and D. Tiwari. Improved captcha method.
• Using a fuzzy method to identify upright orienta- International Journal of Computer Applications
tion instead of a 0 and 1 mechanism. IJCA, 1(25):107–109, 2010.
• Designing a Multiple SEIMCHA which shows [9] M.E. Hoque, D.J. Russomanno, and M. Yeasin.
several images in the GUI instead of one image to 2d captchas from 3d models. In SoutheastCon,
reduce the probability of random guessing attack. 2006. Proceedings of the IEEE, pages 165–170.
• Applying a mechanism to update the database IEEE, 2005.
of input images continuously to improve security [10] The CAPTCHA Project. [Link]
and also to replace images with more usable im- net/captchas/pix/.
ages. [11] T. Pavlidis. Why meaningful automatic tagging
• Designing an ‘almost right’ response mechanism of images is very hard. In Multimedia and Expo,
instead of complete right answer. It would im- 2009. ICME 2009. IEEE International Confer-
prove security more than before [7]. Imagine ence on, pages 1432–1435. IEEE, 2009.
SEIMCHA displays 3 images to users. A complete [12] L. Zhang, M. Li, and H.J. Zhang. Boosting im-
right answer means 3 correct identifications and age orientation detection with indoor vs. out-
an almost right answer means 2 correct answers door classification. In Applications of Computer
out of 3 images. Vision, 2002.(WACV 2002). Proceedings. Sixth
• Designing a particular attack on SEIMCHA that IEEE Workshop on, pages 95–99. IEEE, 2002.
uses several types of attacks. [13] S. Lyu. Automatic image orientation determina-
• And finally, studying SEIMCHA in the context of tion with natural image statistics. In Proceedings
a working website involving vast number of users. of the 13th annual ACM international conference
on Multimedia, pages 491–494. ACM, 2005.
[14] M. Shirali-Shahreza and S. Shirali-Shahreza. Ad-
References vanced collage captcha. In Information Technol-
[1] K.A. Kluever and R. Zanibbi. Balancing usability ogy: New Generations, 2008. ITNG 2008. Fifth
and security in a video CAPTCHA. In Proceed- International Conference on, pages 1234–1235.
ings of the 5th Symposium on Usable Privacy and IEEE, 2008.
Security (SOUPS), page 14. ACM, 2009. [15] Vlad Atanasiu. ROIRotate Function; A
[2] L.V. Ahn, M. Blum, N.J. Hopper, and J. Lang- Function to Fill Corners of Rotated Image.
ford. Captcha: Using hard ai problems for security. Available from [Link]
In Proceedings of the 22nd international confer- matlabcentral/fileexchange/1825, Updated
ence on Theory and applications of cryptographic 2008.
techniques, pages 294–311. Springer-Verlag, 2003. [16] M. Mehrnejad, A. Ghaemi, A. Harati, and E. Tor-
[3] S.A. Ross, J.A. Halderman, and A. Finkelstein. eini. A new image based CAPTCHA based on ge-
Sketcha: a captcha based on line drawings of 3d ometric transformations. In 8thInternational ISC
models. In Proceedings of the 19th international Conference on Information Security and Cryptol-
conference on World wide web, pages 821–830. ogy, FUM, Iran, 2011.
ACM, 2010. [17] D.G. Lowe. Object recognition from local scale-
[4] AA Chandavale, AM Sapkal, and RM Jalnekar. A invariant features. In Computer Vision, 1999. The
Framework to analyze the security of Text based Proceedings of the Seventh IEEE International
CAPTCHA. International Journal of Computer Conference on, volume 2, pages 1150–1157. Ieee,
Applications IJCA, 1(27):127–132, 2010. 1999.
[5] R. Gossweiler, M. Kamvar, and S. Baluja. What’s [18] S. Belongie and J. Malik. Matching with shape
up captcha?: a captcha based on image orien- contexts. In Content-based Access of Image and
tation. In Proceedings of the 18th international Video Libraries, 2000. Proceedings. IEEE Work-
conference on World wide web, pages 841–850. shop on, pages 20–26. IEEE, 2000.
ACM, 2009. [19] TinEye. [Link]
[6] M.H. Shirali-Shahreza and M. Shirali-Shahreza.
ISeCure
76 SEIMCHA: A New Semantic Image CAPTCHA . . . — M. Mehrnejad, A. G. Bafghi, A. Harati, E. Toreini
Maryam Mehrnejad was born in 1986 in Ahad Harati was born in 1978. He re-
Sabzevar, Iran. She received her BS and ceived his BS in Computer Engineering from
MS in Computer Engineering from Ferdowsi Amirkabir University of Technology (2000)
University of Mashhad (FUM) in 2009 and and his MS in Artificial Intelligence and
2011, respectively. She was a member of Robotics from University of Tehran (2002).
Security Information and Communication In 2003, he joined Autonomous System Lab-
Lab in FUM and also a member of FUM oratory at Swiss Federal Institute of Tech-
CERT Lab during her studies. Her main nology in Lausanne (EPFL) and two years
research interests are Security Engineering, HCI-Sec (Human later along with other colleagues moved to Zurich. He got his
and Computer Interaction and Security) and Applied Soft PhD in Robotics in 2008 from ETHZ (Swiss Federal Institute
Computing. of Technology in Zurich). Later he moved back to Mashhad and
joined Ferdowsi University of Mashhad, where he is currently
Abbas Ghaemi Bafghi was born in April an Assistant Professor. His main research interests include
1973 in Bojnord, Iran. He received his BS Range Data Processing and Multiresolution Analysis, Image
degree in Applied Mathematics in Computer Processing and Vision, Simultaneous Localization and Map-
from Ferdowsi University of Mashhad, Iran ping, Human Machine Interaction, and Multiagent Learning.
in 1995, and MS degree in Computer engi-
neering from Amirkabir (Tehran Polytech- Ehsan Toreini was born in September 1984
nique) University of Technology, Iran in 1997. in Ghazvin. He is MS graduate of Islamic
He received his PhD degree in Computer Azad University, Mashhad Branch in 2010
engineering from Amirkabir (Tehran Polytechnique) Univer- and BS graduate of Ferdowsi University of
sity of Technology, Iran in 2004. He is member of Computer Mashhad in 2007. He is now a lecturer in
Society of Iran (CSI) and Iranian Society of Cryptology (ISC). Islamic Azad University, Mashhad Branch
He is an assistant professor in Department of Computer Engi- and member of Young Researchers’ Club.
neering, Ferdowsi University of Mashhad, Iran. His research His main fields of study are Data Mining,
interests are in cryptology and security and he has published Machine Learning and Computational Intelligence.
more than 50 conference and journal papers.
ISeCure