A SURVEY ON CAPTCHA: ORIGIN, APPLICATIONS AND CLASSIFICATION

Authors

  • Dr. Abdalnaser Muhammad Algwil Comptuer Sceince, IT ,Alasmarya Islamic University

Keywords:

Captcha, Security, Usability

Abstract

Captcha challenges have become the most widely used techniques to deter the misuse of services on the Internet. The majority of current Captcha schemes are principally based on distorted text challenges. However, many of these schemes suffer from inadequacies in terms of security, usability, or the balance between them. This calls for alternative Captcha approaches to be devised. In fact, it has become an active research area in the exploration of alternative designs for example, image-based Captcha, motion-based Captcha, and game-based Captcha. This paper reviews the extant literature of the Captcha phenomenon to identify the more praiseworthy aspects and shortcomings of different types of Captcha. We present the origin of Captcha, its importance and uses, Captcha types and their features, as supported with pictorial examples, and key problems in security and usability aspects. Captcha issues on mobile devices is also presented

References

K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, “Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs ( HIPs ),” in 2nd Conference on Email and Anti-Spam (CEAS), California, USA, 2005.

J. Yan and A. S. El Ahmad, “Captcha robustness: A security engineering perspective,” Computer. pp. 54–60, Feb-2011.

J. Yan and A. S. El Ahmad, “Usability of Captchas or usability issues in Captcha design,” Proceedings of the 4th symposium on Usable privacy and security - SOUPS ’08. ACM, New York, NY, USA, 2008, pp. 44–52.

B. B. Zhu, J. Yan, Q. Li, C. Yang, J. Liu, N. Xu, M. Yi, and K. Cai, “Attacks and design of image recognition Captchas,” Proceedings of the 17th ACM conference on Computer and communications security - CCS ’10. ACM, New York, NY, USA, 2010, pp. 187–200.

R. Pakdel, S. Ranjbar, and M. Hashemi, “A User-friendly Captcha Scheme Based on Usability Features,” Info. Technol. J. , vol. 12, no. 1, pp. 61–70, 2013.

“Mobile Future in Focus 2013,” ComScore, Inc., 2013. [Online]. Available: http://www.comscore.com/Insights/Presentations_and_Whitepapers/2013/2013_Mobile_Future_in_Focus.

Turing, A. M. “Computing Machinery and Intelligence-AM Turing,” Mind, 59, no 236, 1950, pp. 433–460.

Baird, H. & Popat, K. “Human Interactive Proofs and Document Image Analysis,” In International Workshop on Document Analysis Systems, Springer Berlin Heidelberg, NJ, USA, 2002, pp. 507–518.

Baird, H. “Complex Image Recognition and Web Security,” Data Complexity in Pattern Recognition, London, Springer, 2006, pp. 287–298.

Yan, J. Bot, “Cyborg and Automated Turing Test: (or ‘Putting the Humanoid in the Protocol’)”, In Security Protocols Workshop, Springer Berlin Heidelberg, 2006, pp. 190–197.

Coates, A. L., Baird, H. S. and Fatema, R. J. “Pessimal Print: A Reverse Turing Test,” In Proceedings of the Sixth International Conference on Document Analysis and Recognition, Seattle, WA, 2001, pp. 1154–1158.

Ahn, L. v., Blum, M. and Langford, J. “Telling Humans and Computers Apart Automatically,” Communi. of the ACM, vol. 47, no. 2, 2004, pp. 57–60.

Chew, M. & Baird, H. S. “BaffleText : A Human Interactive Proof,” In Proceedings of the International Society for Optical Engineering, Santa Clara, California, USA, 2003, pp. 305–316.

Naro, M. “Verification of a Human in the Loop or Identification via the Turing Test”. Unpublished Draft From http://www.wisdom.weizmann.ac.il/~naor/PAPERS/ human_abs .html, 1996.

Lillibridge, M. D., Abadi, M., Bharat, K. and Broder, A. Z. “Method for Selectively Restricting Access to Computer Systems,” U.S. Patent 6195698 B1, Feb.27,2001.

The Official Captcha Site [Online]. Available: http://www.captcha.net. [Accessed: 01-08-2023].

Ahn, L. v., Blum, M. and Langford, J. “Telling Humans and Computers Apart Automatically or How Lazy Cryptographers Do AI,” Sch. of Comp. Sci., Car. Mel. Uni., Pittsburgh, Pennsylvania. U.S., Tech. Rep. CMU-CS-02-117, 2002.

Aburada, K., Usuzaki, S., Yamaba, H., Katayama, T., Mukunoki, M., Park, M. and Okazaki, N. “Implementation of Captcha suitable for mobile devices,” IEICE Comm. Expr., vol. 8, no. 12, pp. 601–605, 2019.

Baird, H. S. and Riopka, T. “ScatterType: A Reading Captcha Resistant to Segmentation Attack,” In Proceedings of the International Society for Optical Engineering, San Jose, California, USA, 2005, pp. 197–207.

Pinkas, B. and Sander, T. “Securing Passwords Against Dictionary Attacks,” In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, 2002, pp. 161–170.

Wilkins, J. “Strong Captcha Guidelines,” v1.2, 2009, pp. 1–18, 2009, [Online]. Available:http://www.123seminarsonly.com/Seminar-Reports/008/47584359-captcha.pdf

Ahn, L. v., Maurer, B., Mcmillen, C., Abraham, D. and Blum, M. “reCaptcha: Human-Based Character Recognition via Web Security Measures”. Science, vol. 321, no 5895, pp. 1465–1468, 2008.

Ahn, L. v., Blum, M., Hopper, N. J. and Langford, J. “Captcha: Using Hard AI Problems for Security,” In International Conference on the Theory and Applications of Cryptographic Techniques, Springer Berlin Heidelberg, pp. 2003, 294–311.

Spamarrest [Online]. Available: http://www.spamarrest.com. [Accessed: 01-08-2023].

eng, Y., Cao, Q., Qi, H. and Ruoti, S. “SenCAPTCHA: A Mobile-First Captcha Using Orientation Sensors,” the ACM on Intera., Mob., Weara. & Ubiqu.Tech., vol. 4, no. 2, pp. 1–26, 2020.

Mori, G. and Malik, J. “Recognizing Objects in Adversarial Clutter: Breaking a Visual Captcha,” In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Madison, WI, U.S., IEEE, 2003, pp. 1–8.

Moy, G., Jones, N., Harkless, C. and Potter, R. “Distortion Estimation Techniques in Solving Visual Captchas,” In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Washington, DC, U.S., IEEE, 2004, pp. 23–28.

Baird, H. S., Moll, M. A. and Wang, S. Y. “A Highly Legible Captcha That Resists Segmentation Attacks,” In Second International Workshop on Human Interactive Proofs, Springer, Berlin, Heidelberg, 2005, pp. 27–41.

Baird, H. S., Moll, M. A. and Wang, S. Y. “ScatterType: A Legible but Hard-to-Segment Captcha,” In Proceedings of the Eighth International Conference on Document Analysis and Recognition, Seoul, Korea, IEEE, 2005, pp. 935–939.

Converse, T. “Captcha Generation as a Web Service,” In Human Interactive Proofs, Springer, Berlin, Heidelberg, 2005, pp. 82–96.

Yan, J. and El-Ahmad, A. S. “Breaking Visual Captchas With Naïve Pattern Recognition Algorithms,” In the Twenty-Third Annual Computer Security Applications Conference, Miami Beach, FL, USA, IEEE, 2007, pp. 279–291.

Simard, P. Y., Szeliski, R., Benaloh, J., Couvreur, J. and Calinov, I. “Using Character Recognition and Segmentation to Tell Computer From Humans,” In Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, UK, IEEE, 2003, pp. 418–423.

Yan, J. and El-Ahmad, A. S. “A Low-Cost Attack on a Microsoft Captcha,” In Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, U.S., ACM, 2008, pp. 543–554.

Bursztein, E., Martin, M. and Mitchell, J. “Text-Based Captcha Strengths and Weaknesses”. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, Illinois, U.S., ACM, 2011, pp. 125–138.

El-Ahmad, A. S., Yan, J. and Tayara, M. “The Robustness of Google Captchas,” Comp. Sci. at Newcastle Uni, Tech. Rep. 1278, 2011.

Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X. and Li, J. “A Simple Generic Attack on Text Captchas,” In Network and Distributed System Security Symposium, San Diego, CA, U.S., 2016, .

Ferzli, R., Bazzi, R. and Karam, L. J. “A Captcha Based on the Human Visual Systems Masking Characteristics.” In Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, Canada, IEEE, 2006, pp. 517–520.

Martinović, G., Attard, A. and Krpić, Z. “Proposing a New Type of Captcha: Character Collage,” In Proceedings of the 34th International Convention, Opatija, Croatia, IEEE, 2011, pp. 1447–1451.

Chew, M. & Tygar, J. D. “Image Recognition Captchas”. In Proceedings of the 7th International Information Security Conference, Springer, 2004, pp. 268–279.

Rusu, A. and Govindaraju, V. “A Human Interactive Proof Algorithm Using Handwriting Recognition,” In Proceedings of the International Conference on Document Analysis and Recognition, Seoul, Korea, IEEE, 2005, pp. 967–971.

Rusu, A. and Govindaraju, V. “Handwritten Captcha: Using the Difference in the Abilities of Humans and Machines in Reading Handwritten Words,” In Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, Kokubunji, Japan, IEEE, 2004, pp. 226–231.

Thomas, A. O., Rusu, A. and Govindaraju, V. “Synthetic Handwritten Captchas,” Patt. Reco., vol. 42, no. 12, pp. 3365–3373, 2009.

Shirali-Shahreza, M. H. and Shirali-Shahreza, M. “Persian/Arabic Baffletext Captcha,” J. of Uni. Comp. Sci., vol. 12, no. 12, pp. 1783–1796, 2006.

Khan, B., Alghathbar, K., Khan, M. K., AlKelabi, A. and AlAjaji, A. “Cyber Security Using Arabic Captcha Scheme,” Int. Ar. J. of Info. Tech., vol. 10, no. 1, pp. 76–84, 2013.

ArCaptcha - Arabic Open Source Automated Test to Tell Computers & Humans Apart [Online]. Available: http://arcaptcha.anini.me. [Accessed: 01-08-2023].

Hsoub Captcha [Online]. Available: https://captcha.hsoub.com/. [Accessed: 01-08-2023].

Alsuhibany, S. A., Alrobah, N., Almohaimeed, F., Alduayji, S. and Parvez, M. T. “Evaluating Robustness of Arabic Captchas,” In the 2nd International Conference on Anti-cyber Crimes (ICACC), Abha, Saudi Arabia, IEEE, 2017, pp. 81–86.

Shi, C., Xu, X., Ji, S., Bu, K., Chen, J., Beyah, R. and Wang, T. “Adversarial Captchas,” IEEE Tran. on Cyb., vol. 52, no. 7, pp. 6095–6108, 2021.

Kwon, H., Yoon, H. and Park, K. W. “Captcha image generation: Two-step style-transfer learning in deep neural networks,” Sensors, vol. 20, no. 5, pp. 1495, 2020.

Kwon, H., Yoon, H. and Park, K. W. “Robust Captcha image generation enhanced with adversarial example methods,” IEICE Trans. on Info. & Sys., vol. 103, no. 4, pp. 879–882, 2020.

Papernot, N., Mcdaniel, P., Jha, S., Fredrikson, M., Celik, Z. B Papernot, N., Mcdaniel, P., Jha, S., Fredrikson, M., Celik, Z. B. and Swami, A. “The limitations of deep learning in adversarial settings,” In Proceedings of IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, IEEE, 2016, pp. 372–387.

Zhang, Y., Gao, H., Pei, G., Kang, S. and Zhou, X. “Effect of Adversarial Examples on the Robustness of Captcha,” In Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Zhengzhou, China, IEEE, 2018, pp. 1–10.

Su, J., Vargas, D. V. and Sakurai, K. “One Pixel Attack for Fooling Deep Neural Networks,” IEEE Trans. on Evo. Comp., vol. 23, no. 5, pp. 828–841, 2019.

Shirali-Shahreza, M. “Highlighting Captcha,” In Conference on Human System Interactions, Krakow, Poland, IEEE, 2008, pp. 247–250.

Rui, Y. and Liu, Z. “Artificial: Automated Reverse Turing Test Using Facial Features,” Multi. Sys., vol. 9, no. 6, pp. 493–502, 2004.

Conti, M., Guarisco, C. and Spolaor, R. “CAPTCHaStar! A Novel Captcha based on Interactive Shape Discovery,” In Proceedings of the 14th International Conference on Applied Cryptography and Network Security, Springer, 2016, pp. 611–628.

Misra, D. and Gaj, K. “Face Recognition Captchas,” In Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, Guadeloupe, French Caribbean, IEEE, 2006, pp. 122-127.

D’Souza, D., Polina, P. C. and Yampolskiy, R. V. “Avatar Captcha: Telling Computers and Humans Apart via Face Classification,” In IEEE International Conference on Electro Information Technology, Indianapolis, USA, 2012, pp. 1–6.

Schryen, G., Wagner, G. and Schlegel, A. “Development of Two Novel Face-recognition Captchas: A Security and Usability Study,” Comp.&Sec., Elsevier, vol. 60, pp. 95–116, 2016.

Datta, R., Li, J. and Wang, J. Z. “IMAGINATION: A Robust Image-based Captcha Generation System,” In Proceedings of the 13th annual ACM international conference on multimedia, Singapore, ACM, 2005, pp. 331–334.

Shirali-Shahreza, S., Penn, G., Balakrishnan, R. and Ganjali, Y. “Seesay and Hearsay Captchas for Mobile Interaction,” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France ACM, 2013, pp. 2147–2156.

Baird, H. S. and Bentley, J. L. “Implicit Captchas,” In Proceedings of SPIE Document Recognition & Retrieval XII Conference, San Jose, CA, 2005, pp. 191–196.

Elson, J., Douceur, J. R., Howell, J. and Saul, J. “Asirra: A Captcha That Exploits Interest-Aligned Manual Image Categorization,” In Proceedings of 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, U.S., ACM, 2007, pp. 366–374.

Golle, P. “Machine Learning Attacks Against the Asirra Captcha,” In Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, U.S., ACM, 2008, pp. 535–542.

Confident Captcha [Online]. Available: http://confidenttechnologies.com/confident-captcha/. [Accessed: 27-09-2017].

Google reCaptcha [Online]. Available: https://www.google.com/recaptcha/intro/. [Accessed: 01-08-2023].

Sivakorn, S., Polakis, I. and Keromytis, A. D. “I am Robot: (Deep) learning to break semantic image Captchas,”. In Proceedings of the IEEE European Symposium on Security and Privacy, Saarbruecken, Germany, IEEE, 2016, pp. 388–403.

Akrout, I., Feriani, A. and Akrout, M. “Hacking Google reCaptcha v3 using Reinforcement Learning,” arXiv:1903.01003, 2019. . Retrieved from https://arxiv.org/abs/1903.01003.

Gossweiler, R., Kamvar, M. and Baluja, S. “What ’ s Up Captcha? A Captcha Based On Image Orientation,” In Proceedings of the 18th international conference on World wide web, Madrid, Spain, ACM, 2009, pp. 841–850.

Ross, S. A., Halderman, J. A. and Finkelstein, A. “Sketcha: A Captcha Based on Line Drawings of 3D Models,” In Proceedings of the 19th international conference on World wide web, Raleigh, North Carolina, U.S., ACM, 2010, pp. 821–830.

Mehrnezhad, M., Ghaemi Bafghi, A., Harati, A. and Toreini, E. “PiSHi: Click the Images and I Tell if You Are a Human,”. Int. J. of Info. Sec., vol. 16, no. 2, pp. 133–149, 2017.

Banday, M. T. and Shah, N. A. “Image Flip Captcha,” ISC Int. J. of Info. Sec., vol. 1, no. 2, pp. 105–123, 2009.

Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P. and Wang, P. “Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha,” IEEE Tran. on Info. Fore. & Sec., vol. 13, no. 10, pp. 2522–2537, 2018.

Ray, P., Bera, A., Giri, D. and Bhattacharjee, D. “Style matching Captcha: match neural transferred styles to thwart intelligent attacks,” Multimedia Systems, 2023, pp. 1–24.

Zhao, B., Weng, H., Ji, S., Chen, J., Wang, T., He, Q. and Beyah, R. “Towards evaluating the security of real-world deployed image Captchas,” In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, Toronto, Canada, 2018, pp. 85–96.

Weng, H., Zhao, B., Ji, S., Chen, J., Wang, T., He, Q. and Beyah, R. “Towards understanding the security of modern image captchas and underground captcha-solving services,” Big Data Min. & Anal., vol. 2, no. 2, pp. 118–144, 2019.

Bursztein, E., Bethard, S., Fabry, C., Mitchell, J. C. and Jurafsky, D. “How Good Are Humans at Solving Captchas? A Large Scale Evaluation,” In the 2010 IEEE Symposium on Security and Privacy, Berkeley, California, IEEE, 2010, pp. 399–413.

Chan, N. “Abstract of Sound Oriented Captcha,” In Proceedings of the First HIP Conference, 2002, p. 35.

Lopresti, D., Shih, C. and Kochanski, G. “Human Interactive Proofs for Spoken Language Interfaces,” In Proceedings of the First HIP Conference, 2002, pp. 30–34.

Fanelle, V., Shah, A., Karimi, S., Subramanian, B. and Das, S. “Blind and human: Exploring more usable audio Captcha designs,” In Proceedings of the 16th Symposium on Usable Privacy and Security, 2020, pp. 111–125.

Alnfiai, M. “A novel design of audio Captcha for visually impaired users,” Inter. J. of Comm. Net. & Info. Sec., vol. 12, no. 2, pp. 168–179, 2020.

Bock, K., Patel, D., Hughey, G. and Levin, D. “unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge,” In Proceedings of the 11th USENIX Conference on Offensive Technologies, Vancouver, BC, Canada, 2017.

Bursztein, E., Beauxis, R., Paskov, H., Perito, D., Fabry, C. and Mitchell, J. “The Failure of Noise Based Non-continuous Audio Captchas,” In Symposium on Security and Privacy, Oakland, CA, U.S., IEEE, 2011, pp. 19–31.

Sano, S., Otsuka, T. and Okuno, H. G. “Solving Google’s Continuous Audio Captcha With HMM-Based Automatic Speech Recognition,” In Advances in Information and Computer Security, Springer, Berlin, Heidelberg, 2013, pp. 36–52.

Athanasopoulos, E. and Antonatos, S. “Enhanced Captchas: Using Animation to Tell Humans and Computers Apart,” In the 10th International Federation for Information Processing (IFIP), Springer, Berlin, Heidelberg, 2006, pp. 97–108.

Shirali-Shahreza, M. and Shirali-Shahreza, S. “Motion Captcha,” In the Conference on Human System Interactions, Krakow, Poland, IEEE, 2008, pp. 1042–1044.

Kluever, K. A. and Zanibbi, R. “Balancing Usability and Security in a Video Captcha,” In Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, California U.S., ACM, 2009, pp. 1–11.

NuCaptcha [Online]. Available: http://www.nucaptcha.com/. [Accessed: 25-08-2017].

Godfrey, P. B. “Text-Based Captcha Algorithms,” In First Workshop on Human Interactive Proofs, 2002, Available Electronically:

http://www.aladdin.cs.cmu.edu/hips/events/abs/godfreyb_abstract.pdf.

TextCaptcha v41 [Online]. Available: http://textcaptcha.com/. [Accessed: 01-08-2023].

Stevanović, R. Quantum Random Bit Generator Service [Online]. Available: http://random.irb.hr/. [Accessed: 01-08-2023].

Hernandez-Castro, C. J. and Ribagorda, A. “Pitfalls in Captcha Design and Implementation: The Math Captcha, a Case Study,” Comp. & Sec., vol. 29, no. 1, pp. 141–157, 2010.

Wang, H., Zheng, F., Chen, Z., Lu, Y., Gao, J. and Wei, R. “A Captcha Design Based on Visual Reasoning,” In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, AB, Canada, IEEE, 2018, pp. 1967–1971.

Gao, Y., Gao, H., Luo, S., Zi, Y., Zhang, S., Mao, W., Wang, P., Shen, Y. and Yan, J. “Research on the security of visual reasoning Captcha,” In Proceedings of the 30th USENIX Security Symposium, 2021, pp. 3291–3308.

Trong, N. D., Huong, T. H. and Hoang, V. T. “New Cognitive Deep-Learning Captcha," Sens., vol. 23, no. 4, p. 2338, 2023.

Are You a Human [Online]. Available: http://areyouahuman.com. [Accessed: 06-12-2013].

Bypass Captcha, Areyouahuman Captcha System [Online]. Available: https://bypasscaptchasite.wordpress.com/2016/09/09/areyouahuman-captcha-system/. [Accessed: 01-08-2023].

Mobile and Tablet Internet Usage Exceeds Desktop for First Time Worldwide [Online]. Available: http://gs.statcounter.com/press/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. [Accessed: 01-08-2023].

Desktop vs Mobile Market Share Worldwide [Online]. Available: http://gs.statcounter.com/platform-market-share/desktop-mobile-tablet. [Accessed: 01-08-2023].

Reynaga, G. and Chiasson, S. “The Usability of Captchas on Smartphones,” In International Conference on Security and Cryptography, Reykjavik, Iceland, 2013, pp. 1–8.

Chow, R., Golle, P., Jakobsson, M., Wang, L. and Wang, X. “Making Captchas Clickable,” In Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, Napa Valley, Cl, U.S., ACM, 2008, pp. 91–94.

Shirali-Shahreza, M. and Shirali-Shahreza, S. “Drawing Captcha,” In Proceedings of the 28th International Conference on Information Technology Interfaces, Cavtat, Croatia, IEEE, 2006, pp. 475–480.

Lin, R., Huang, S.-Y., Bell, G. B. and Lee, Y.-K. ”A New Captcha Interface Design for Mobile Devices. In Proceedings of the Twelfth Australasian User Interface Conference, Perth, Australia, 2011, pp. 3–8.

Desai, A. and Patadia, P. “Drag and Drop: A Better Approach to Captcha,” In Proceedings of Annual IEEE India Conference, IEEE, 2009, pp. 1–4.

Truong, H. D., Turner, C. F. and Zou, C. C. “iCaptcha: The Next Generation of Captcha Designed to Defend Against 3rd Party Human Attacks,” In IEEE International Conference on Communications, Kyoto, Japan, IEEE, 2011, pp. 1–6.

Leiva, L. A. and Álvaro, F. “μCaptcha: Human Interaction Proofs Tailored to Touch-Capable Devices via Math Handwriting,” Inter. J. of Hum. Com. Intera., vol. 31, no. 7, pp. 457–471, 2015.

Yang, T. I., Koong, C. S. and Tseng, C. C. “Game-Based Image Semantic Captcha on Handset Devices,” Multi. Too. & App., vol. 74, no. 14, pp. 5141–5156, 2015.

Algwil, A., Ciresan, D., Liu, B. and Yan, J. “A security analysis of automated Chinese turing tests,” in Proceedings of the 32nd annual conference on computer security applications, United Stats, 2016, pp. 520-532.

Algwil, A. and Yan, J. “Failures of security APIs: A new case,” in Proceedings of Financial Cryptography and Data Security, Springer Berlin Heidelberg, 2016, pp. 283–298.

Algwil, A. “Click-based Captcha paradigm as a web service,” J. of App. Sci., vol. 35, no. 2, pp. 1-26, 2022.

Downloads

Published

2023-06-30

Issue

Section

Article

How to Cite

A SURVEY ON CAPTCHA: ORIGIN, APPLICATIONS AND CLASSIFICATION (A. M. Algwil , Trans.). (2023). Journal of Basic Sciences, 36(1), 1-37. https://journals.asmarya.edu.ly/jbs/index.php/jbs/article/view/208

Similar Articles

1-10 of 14

You may also start an advanced similarity search for this article.