An Empirical Analysis of CAPTCHA Image Design Choices in Cloud Services

Xiaojiang Zuo, Xiao Wang, Rui Han

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cloud service uses CAPTCHA to protect itself from malicious programs. With the explosive development of AI technology and the emergency of third-party recognition services, the factors that influence CAPTCHA's security are going to be more complex. In such a situation, evaluating the security of mainstream CAPTCHAs in cloud services is helpful to guide better CAPTCHA design choices for providers. In this paper, we evaluate and analyze the security of 6 mainstream CAPTCHA image designs in public cloud services. According to the evaluation results, we made some suggestions of CAPTCHA image design choices to cloud service providers. In addition, we particularly discussed the CAPTCHA images adopted by Facebook and Twitter. The evaluations are separated into two stages: (i) using AI techniques alone; (ii) using both AI techniques and third-party services. The former is based on open source models; the latter is conducted under our proposed framework: CAPTCHAMix.

Original languageEnglish
Title of host publicationINFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665409261
DOIs
Publication statusPublished - 2022
Event2022 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2022 - Virtual, Online, United States
Duration: 2 May 20225 May 2022

Publication series

NameINFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops

Conference

Conference2022 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2022
Country/TerritoryUnited States
CityVirtual, Online
Period2/05/225/05/22

Keywords

  • CAPTCHA
  • artificial intelligence
  • recognition

Fingerprint

Dive into the research topics of 'An Empirical Analysis of CAPTCHA Image Design Choices in Cloud Services'. Together they form a unique fingerprint.

Cite this