An Attack on Hollow CAPTCHA Using Accurate Filling and Nonredundant Merging

被引:9
作者
Chen, Jun [1 ]
Luo, Xiangyang [1 ]
Hu, Jianwei [1 ]
Ye, Dengpan [2 ]
Gong, Daofu [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou, Henan, Peoples R China
[2] Wuhan Univ, Sch Comp, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy protection; multimedia security; big data; Hollow CAPTCHA; Attack; Inner-outer contour; Minimum-nearest neighbor; BREAKING; RECOGNITION;
D O I
10.1080/02564602.2018.1520152
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As one of the effective access control mechanism, CAPTCHA can provide privacy protection and multimedia security for big data. In this paper, an attack on hollow CAPTCHA using accurate filling and nonredundant merging is proposed. Firstly, a thinning operation is introduced to repair character contour precisely. Secondly, an inner-outer contour filling algorithm is presented to acquire solid characters, which only fills the hollow character components rather than noise blocks. Thirdly, the segmentation to the solid characters produces mostly individual characters and only a small number of character components. Fourthly, a minimum-nearest neighbor merging algorithm is proposed to obtain individual characters without redundancy. Lastly, the convolutional neural network (CNN) is applied to acquire the final recognition results. The experimental results based on the real CAPTCHA data sets show that comparing with the existing attack methods on hollow CAPTCHA, the proposed method has higher success rate and superior efficiency.
引用
收藏
页码:106 / 118
页数:13
相关论文
共 23 条
[1]  
[Anonymous], CSTR1278 NEWC U
[2]  
Bursztein E, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P125
[3]  
Gao H., 2013, P 2013 ACM SIGSAC C, P1075
[4]   Research on the Security of Microsoft's Two-Layer Captcha [J].
Gao, Haichang ;
Tang, Mengyun ;
Liu, Yi ;
Zhang, Ping ;
Liu, Xiyang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) :1671-1685
[5]  
Gonzalez RC, 2007, Coursesmart eTextbook
[6]  
Haralick R.M., 1991, Computer and Robot Vision, VI.
[7]   THINNING METHODOLOGIES - A COMPREHENSIVE SURVEY [J].
LAM, L ;
LEE, SW ;
SUEN, CY .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1992, 14 (09) :869-885
[8]   HANDWRITTEN DIGIT RECOGNITION - APPLICATIONS OF NEURAL NETWORK CHIPS AND AUTOMATIC LEARNING [J].
LECUN, Y ;
JACKEL, LD ;
BOSER, B ;
DENKER, JS ;
GRAF, HP ;
GUYON, I ;
HENDERSON, D ;
HOWARD, RE ;
HUBBARD, W .
IEEE COMMUNICATIONS MAGAZINE, 1989, 27 (11) :41-46
[9]   Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division [J].
Liu, Wenyan ;
Luo, Xiangyang ;
Liu, Yimin ;
Liu, Jianqiang ;
Liu, Minghao ;
Shi, Yun Q. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01) :71-93
[10]   Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes [J].
Luo, Xiangyang ;
Song, Xiaofeng ;
Li, Xiaolong ;
Zhang, Weiming ;
Lu, Jicang ;
Yang, Chunfang ;
Liu, Fenlin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13557-13583