2017
DOI: 10.1109/tifs.2017.2682704
|View full text |Cite
|
Sign up to set email alerts
|

Research on the Security of Microsoft’s Two-Layer Captcha

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 61 publications
(29 citation statements)
references
References 14 publications
0
29
0
Order By: Relevance
“…Besides, their approach applied to fixed-length CAPTCHAs only. In 2017, Gao's team proposed another deep-learning-based method that used an imitator to generate CAPTCHAs for attacking Microsoft's two-layer hollow scheme [2]. Later, Le et al [20] used synthetic data to train the recognition model and achieved good success rates on their synthetic data, ranging from 91.05% to 99.8%, but their model performed poorly on the real-world CAPTCHAs.…”
Section: Background a Prior Attacksmentioning
confidence: 99%
“…Besides, their approach applied to fixed-length CAPTCHAs only. In 2017, Gao's team proposed another deep-learning-based method that used an imitator to generate CAPTCHAs for attacking Microsoft's two-layer hollow scheme [2]. Later, Le et al [20] used synthetic data to train the recognition model and achieved good success rates on their synthetic data, ranging from 91.05% to 99.8%, but their model performed poorly on the real-world CAPTCHAs.…”
Section: Background a Prior Attacksmentioning
confidence: 99%
“…Other atacks. The work presented by Gao et al targets captchas of hollow characters [16]. Their approach irst ills the hollow character strokes, and then searches for the possible combinations of adjacent character strokes to recognize individual characters.…”
Section: Related Workmentioning
confidence: 99%
“…The second is the connecting characters together (CCT) method [20], which adds overlapping and noise to characters, and adds curvature to text images in order to increase resistance to recognition and character segmentation via automated attacks. The third is the character isolation method [21], which displays each character independently of the others, unlike the other two methods. With this method, the distortion of each character is more severe than with the other techniques.…”
Section: Text-based Captchamentioning
confidence: 99%