2020
DOI: 10.1587/transinf.2019edl8194
|View full text |Cite
|
Sign up to set email alerts
|

Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

Abstract: Malicious attackers on the Internet use automated attack programs to disrupt the use of services via mass spamming, unnecessary bulletin boarding, and account creation. Completely automated public turing test to tell computers and humans apart (CAPTCHA) is used as a security solution to prevent such automated attacks. CAPTCHA is a system that determines whether the user is a machine or a person by providing distorted letters, voices, and images that only humans can understand. However, new attack techniques su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 8 publications
(7 reference statements)
0
14
0
Order By: Relevance
“…GAN was also tested using actual CAPTCHA images. The second method [23] generates CAPTCHA images using the adversarial example technique. Adversarial example adds a little noise to the original CAPTCHA to maintain human perception, while CAPTCHA recognition systems misidentifies it.…”
Section: Other Methods For Generating Captchasmentioning
confidence: 99%
“…GAN was also tested using actual CAPTCHA images. The second method [23] generates CAPTCHA images using the adversarial example technique. Adversarial example adds a little noise to the original CAPTCHA to maintain human perception, while CAPTCHA recognition systems misidentifies it.…”
Section: Other Methods For Generating Captchasmentioning
confidence: 99%
“…Deep learning has become popular for different applications [ 1 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ]; single image SR (SISR) is one of them [ 27 , 28 , 29 , 30 , 31 ]. It is a very challenging problem due to the transformation of a specific low-resolution (LR) image to a high-resolution (HR) image.…”
Section: Background Of Iim and Super Resolutionmentioning
confidence: 99%
“…They used the VGG16, ResNet101, and the Inception-ResNet-V2 CNNs in conjunction with the Fast Gradient Sign Method and the Universal Adversarial Perturbations method [78] to generate their adversarial text-based CAPTCHAs. Kwon et al [79] generated their adversarial text-based CAPTCHAs using the FGSM, I-FGSM, and the Deep-Fool algorithms. Their experiment results showed a 0% recognition rate with epsilon of 0.15 for FGSM, a 0% recognition rate with alpha of 0.1 with 50 iterations for I-FGSM, and a 45% recognition rate with 150 iterations for the Deep-Fool algorithm.…”
Section: Related Workmentioning
confidence: 99%