banner

A systematic literature review: Integrating deep learning models for visual-based CAPTCHA generation

Qian Wang, Shafaf Ibrahim, Zainura Idrus

Abstract


The review conducted a systematic literature review (SLR) of the CAPTCHA generation field to analyze the attack resistance and user-friendliness of the existing CAPTCHA generation techniques. The survey reviewed 28 representative papers out of 1363 CAPTCHA generation-related papers from the Scopus academic database, outlining the image-based CAPTCHA generation techniques. The review employed multiple tables and graphs to assess the resistance to attacks and user-friendliness performance of CAPTCHA. The CAPTCHA is produced by using various generation techniques. The review addresses the following research questions: What deep learning generation techniques are employed for image-based CAPTCHA? Should the evaluation of CAPTCHA generation effectiveness prioritize security alone or consider attack resistance and user-friendliness simultaneously? The answers can provide comprehensive help and future work for scholars. The review further proposes possible future research directions, such as integrating various CAPTCHA generation technologies, including image processing techniques, deep learning algorithms, and human cognitive ability models, to generate more challenging CAPTCHA, effectively preventing attacks by robots or malicious software.


Keywords


CAPTCHA generation; deep learning; anti-recognition; user-friendliness; cybersecurity

Full Text:

PDF

References


1. von Ahn L, Blum M, Hopper NJ, Langford J. CAPTCHA: Using hard AI problems for security. In: Proceedings of the Advances in Cryptology—EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques.

2. von Ahn L, Maurer B, McMillen C, et al. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science. 2008; 321(5895): 1465-1468. doi: 10.1126/science.1160379

3. Awasthi S, Srivastava AP, Srivastava S, et al. A Comparative Study of Various CAPTCHA Methods for Securing Web Pages. 2019 International Conference on Automation, Computational and Technology Management (ICACTM). Published online April 2019. doi: 10.1109/icactm.2019.8776832

4. Mirkovic J, Reiher P. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review. 2004; 34(2); 39–53.

5. Gutub A, Kheshaifaty N. Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication. Multimedia Tools and Applications. 2023; 82(30): 46577-46609. doi: 10.1007/s11042-023-15586-5

6. Zhu BB, Yan J, Guanbo Bao, et al. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems. IEEE Transactions on Information Forensics and Security. 2014; 9(6): 891-904. doi: 10.1109/tifs.2014.2312547

7. Reed S, Akata Z, Yan X, et al. Generative Adversarial Text to Image Synthesis. In: Proceedings of the 33rd International Conference on Machine Learning.

8. Chen C, Li O, Tao D, et al. This Looks Like That: Deep Learning for Interpretable Image Recognition. Available online: https://proceedings.neurips.cc/paper/2019/hash/adf7ee2dcf142b0e11888e72b43fcb75-Abstract.html (accessed on 2 December 2023).

9. Deng J, Xuan X, Wang W, et al. A review of research on object detection based on deep learning. Journal of Physics: Conference Series. 2020; 1684(1): 012028. doi: 10.1088/1742-6596/1684/1/012028

10. Aouani H, Ayed YB. Speech Emotion Recognition with deep learning. Procedia Computer Science. 2020; 176: 251-260. doi: 10.1016/j.procs.2020.08.027

11. Ajagbe SA, Adigun MO. Deep learning techniques for detection and prediction of pandemic diseases: a systematic literature review. Multimedia Tools and Applications. 2023; 83(2): 5893-5927. doi: 10.1007/s11042-023-15805-z

12. Roy PK, Saumya S, Singh JP, et al. Analysis of community question‐answering issues via machine learning and deep learning: State‐of‐the‐art review. CAAI Transactions on Intelligence Technology. 2022; 8(1): 95-117. doi: 10.1049/cit2.12081

13. Altalhi S, Gutub A. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. Journal of Ambient Intelligence and Humanized Computing. 2021; 12(11): 10209–10221. doi: 10.1007/s12652-020-02789-z

14. Wang P, Gao H, Guo X, et al. An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Computing Surveys. 2023; 55(9): 1-38. doi: 10.1145/3559754

15. Chandavale AA, Sapkal AM, Jalnekar RM. Algorithm to Break Visual CAPTCHA. 2009 Second International Conference on Emerging Trends in Engineering & Technology. Published online 2009. doi: 10.1109/icetet.2009.24

16. Chew M, Tygar JD. Image recognition captchas. In: International Conference on Information Security. Springer; 2004.

17. Wang P, Gao H, Shi Z, et al. Simple and Easy: Transfer Learning-Based Attacks to Text CAPTCHA. IEEE Access. 2020; 8: 59044-59058. doi: 10.1109/access.2020.2982945

18. Noury Z, Rezaei M. Deep-CAPTCHA: A deep learning based CAPTCHA solver for vulnerability assessment. Published online 2020. doi: 10.48550/ARXIV.2006.08296

19. Zi Y, Gao H, Cheng Z, et al. An End-to-End Attack on Text CAPTCHAs. IEEE Transactions on Information Forensics and Security. 2020; 15: 753-766. doi: 10.1109/tifs.2019.2928622

20. Adesina AO, Ayobioloja PS, Obagbuwa IC, et al. An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time. CMC-Computers Materials & Continua. 2023; 74(2).

21. Kwon H, Yoon H, Park KW. Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. IEICE Transactions on Information and Systems. 2020; E103.D(4): 879-882. doi: 10.1587/transinf.2019edl8194

22. Sheriff M, Mahesh V, S MSH, et al. No Bot Anticipates the Deep Captcha Presenting Disposed Illustrations with Applications to Captcha Generation. In: Proceedings of the 2023 International Conference on Circuit Power and Computing Technologies (ICCPCT).

23. Wen Y. Robust image-based CAPTCHA generation using adversarial attack. Subramanian K, ed. Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022). Published online January 13, 2023. doi: 10.1117/12.2655934

24. Ardhita NB, Maulidevi NU. Robust adversarial example as captcha generator. In: Proceedings of the 2020 7th International conference on advance informatics: concepts, theory and applications (ICAICTA).

25. Page MJ, McKenzie JE, Bossuyt PM, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ. Published online March 29, 2021: n71. doi: 10.1136/bmj.n71

26. Kheshaifaty N, Gutub A. Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. International Journal of Computer Science and Network Security. 2020; 20(9): 16–28.

27. Kheshaifaty N, Gutub A. Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication. Journal of Engineering Research. Published online November 10, 2021. doi: 10.36909/jer.13761

28. Ye G. Yet another text captcha solver: A generative adversarial network based approach. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security.

29. Kim S, Choi S. DotCHA: An Interactive 3D Text-based CAPTCHA. Journal of Web Engineering. 2020. doi: 10.13052/jwe1540-9589.1884

30. Imsamai M, Phimoltares S. 3D CAPTCHA: A Next Generation of the CAPTCHA. 2010 International Conference on Information Science and Applications. Published online 2010. doi: 10.1109/icisa.2010.5480258

31. Woo SS. Design and evaluation of 3D CAPTCHAs. Computers & Security. 2019; 82: 49-67. doi: 10.1016/j.cose.2018.12.006

32. Gao H, Yao D, Liu H, et al. A Novel Image Based CAPTCHA Using Jigsaw Puzzle. 2010 13th IEEE International Conference on Computational Science and Engineering. Published online December 2010. doi: 10.1109/cse.2010.53

33. Ye G, Tang Z, Fang D, et al. Using Generative Adversarial Networks to Break and Protect Text Captchas. ACM Transactions on Privacy and Security. 2020; 23(2): 1-29. doi: 10.1145/3378446

34. Zhang J, Tsai MY, Kitchat K, et al. A secure annuli CAPTCHA system. Computers & Security. 2023; 125: 103025. doi: 10.1016/j.cose.2022.103025

35. Goswami G, Powell BM, Vatsa M, et al. FaceDCAPTCHA: Face detection based color image CAPTCHA. Future Generation Computer Systems. 2014; 31: 59-68. doi: 10.1016/j.future.2012.08.013

36. Li X. A new CAPTCHA based on facial expression recognition. In: Proceedings of the Fifth International Conference on Artificial Intelligence and Computer Science (AICS 2023). Available online: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/12803/128032N/A-new-CAPTCHA-based-on-facial-expression-recognition/10.1117/12.3009229.short (accessed on 2 December 2023).

37. Moradi M, Keyvanpour MR. A novel CAPTCHA scheme based on facial expression reconstruction. International Journal of Electronic Business. 2020; 15(4): 368. doi: 10.1504/ijeb.2020.111061

38. Gutub A, Shambour MK, Abu-Hashem MA. Coronavirus impact on human feelings during 2021 Hajj season via deep learning critical Twitter analysis. Journal of Engineering Research. 2023; 11(1): 100001. doi: 10.1016/j.jer.2023.100001

39. Singh A, Satapathy SC, Roy A, et al. AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope. Arabian Journal for Science and Engineering. 2022; 47(8): 9801-9831. doi: 10.1007/s13369-021-06348-2

40. Sufi FK, Alsulami M, Gutub A. Automating Global Threat-Maps Generation via Advancements of News Sensors and AI. Arabian Journal for Science and Engineering. 2022; 48(2): 2455-2472. doi: 10.1007/s13369-022-07250-1

41. Hemalatha J, Sekar M, Kumar C, et al. Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. Journal of Information Security and Applications. 2023; 76: 103541. doi: 10.1016/j.jisa.2023.103541

42. Farooqi N, Gutub A, Khozium MO. Smart community challenges: Enabling IoT/M2M technology case study. Life Science Journal. 2019; 16(7): 11–17.

43. Hitaj D, Hitaj B, Jajodia S, et al. Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intelligent Systems. 2021; 36(5): 104-112. doi: 10.1109/mis.2020.3036156

44. Shao R, Shi Z, Yi J, et al. Robust Text CAPTCHAs Using Adversarial Examples. 2022 IEEE International Conference on Big Data (Big Data). Published online December 17, 2022. doi: 10.1109/bigdata55660.2022.10021100

45. Trong ND, Huong TH, Hoang VT. New Cognitive Deep-Learning CAPTCHA. Sensors. 2023; 23(4): 2338. doi: 10.3390/s23042338

46. Kwon H, Yoon H, Park KW. CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks. Sensors. 2020; 20(5): 1495. doi: 10.3390/s20051495

47. Cheng Z, Gao H, Liu Z, et al. Image‐based CAPTCHAs based on neural style transfer. IET Information Security. 2019; 13(6): 519-529. doi: 10.1049/iet-ifs.2018.5036

48. Shi C, Xu X, Ji S, et al. Adversarial CAPTCHAs. IEEE Transactions on Cybernetics. 2022; 52(7): 6095-6108. doi: 10.1109/tcyb.2021.3071395

49. Chow YW, Susilo W, Thorncharoensri P. CAPTCHA design and security issues. Advances in Cyber Security: Principles, Techniques, and Applications; 2019.

50. Tian P, Liao W, Kimbrough T, et al. Generating Adversarial Robust Defensive CAPTCHA (GARD-CAPTCHA) in Convolutional Neural Networks. In: International Conference on Software Engineering Research and Applications. Springer; 2022.

51. Chen J, Gao X, Deng R, et al. Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. IEEE Transactions on Dependable and Secure Computing. 2022; 19(3): 1810-1825. doi: 10.1109/tdsc.2020.3037500

52. Dinh N, Tran-Trung K, Truong Hoang V. Augment CAPTCHA Security Using Adversarial Examples With Neural Style Transfer. IEEE Access. 2023; 11: 83553-83561. doi: 10.1109/access.2023.3298442

53. Zhang J, Sang J, Xu K, et al. Robust CAPTCHAs Towards Malicious OCR. IEEE Transactions on Multimedia. 2021; 23: 2575-2587. doi: 10.1109/tmm.2020.3013376

54. Ray P, Bera A, Giri D, Bhattacharjee D. Style matching CAPTCHA: Match neural transferred styles to thwart intelligent attacks. Multimedia Systems. 2023; 29(4). doi: 10.1007/s00530-023-01075-0

55. Chen H, Jiang B, Chen H. StyleCAPTCHA. Proceedings of the 2020 ACM-IMS on Foundations of Data Science Conference. Published online October 18, 2020. doi: 10.1145/3412815.3416895

56. Shim JY, Jung S, Kim J, et al. Stabilized Performance Maximization for GAN-based Real-Time Authentication Image Generation over Internet. Multimedia Tools and Applications. Published online July 15, 2023. doi: 10.1007/s11042-023-15885-x

57. Rathor VS, Garg B, Patil M, et al. Security analysis of image CAPTCHA using a mask R-CNN-based attack model. International Journal of Ad Hoc and Ubiquitous Computing. 2021; 36(4): 238. doi: 10.1504/ijahuc.2021.114108

58. Alqahtani FH, Alsulaiman FA. Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. Computers & Security. 2020; 88: 101635. doi: 10.1016/j.cose.2019.101635

59. Szegedy C, Zaremba W, Sutskever I, et al. Intriguing properties of neural networks. Published online 2013. doi: 10.48550/ARXIV.1312.6199

60. Alsuhibany SA. A Survey on Adversarial Perturbations and Attacks on CAPTCHAs. Applied Sciences. 2023; 13(7): 4602. doi: 10.3390/app13074602

61. Jia X, Xiao J, Wu C. TICS: Text–image-based semantic CAPTCHA synthesis via multi-condition adversarial learning. The Visual Computer; 2022.




DOI: https://doi.org/10.32629/jai.v7i5.1551

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Qian Wang, Shafaf Ibrahim, Zainura Idrus

License URL: https://creativecommons.org/licenses/by-nc/4.0/