Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network

  • Conference paper
  • First Online:
Information Security Applications (WISA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11897))

Included in the following conference series:

Abstract

CAPTCHA is widely used as a security solution to prevent automated attack tools on websites. However, CAPTCHA is difficult to recognize human perception when it gives a lot of distortion to have resistance against the automated attack. In this paper, we propose a method to deceive the machine while maintaining the human perception rate by applying the style transfer method. This method creates a style-plugged-CAPTCHA image by combining the styles of different images while maintaining the content of the original CAPTCHA sample. We used 6 datasets in the actual site and used Tensorflow as the machine learning library. Experimental results show that the proposed method reduces the recognition rate of the DeCAPTCHA system to 3.5% while maintaining human perception.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. GSA Captcha Breaker: GSA - Softwareentwicklung und Analytik GmbH (2017). https://captcha-breaker.gsa-online.de/

  2. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: OSDI, vol. 16, pp. 265–283 (2016)

    Google Scholar 

  3. Alorini, D., Rawat, D.B.: Automatic spam detection on gulf dialectical Arabic Tweets. In: 2019 International Conference on Computing, Networking and Communications (ICNC), pp. 448–452. IEEE (2019)

    Google Scholar 

  4. Bukac, V., Stavova, V., Nemec, L., Riha, Z., Matyas, V.: Service in denial – clouds going with the winds. Network and System Security. LNCS, vol. 9408, pp. 130–143. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_9

    Chapter  Google Scholar 

  5. Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 125–138. ACM (2011)

    Google Scholar 

  6. Swamy Das, M., Rao, K.R.M., Balaji, P.: Neural-based hit-count feature extraction method for Telugu script optical character recognition. In: Saini, H.S., Singh, R.K., Patel, V.M., Santhi, K., Ranganayakulu, S.V. (eds.) Innovations in Electronics and Communication Engineering. LNNS, vol. 33, pp. 479–486. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-8204-7_48

    Chapter  Google Scholar 

  7. Demoulin, H.M., Pedisich, I., Phan, L.T.X., Loo, B.T.: Automated detection and mitigation of application-level asymmetric dos attacks. In: Proceedings of the Afternoon Workshop on Self-Driving Networks, pp. 36–42. ACM (2018)

    Google Scholar 

  8. Gao, H., Tang, M., Liu, Y., Zhang, P., Liu, X.: Research on the security of microsoft’s two-layer captcha. IEEE Trans. Inf. Forensics Secur. 12(7), 1671–1685 (2017)

    Article  Google Scholar 

  9. Gao, H., Wang, W., Fan, Y., Qi, J., Liu, X.: The robustness of “connecting characters together” CAPTCHAs. J. Inf. Sci. Eng. 30(2), 347–369 (2014)

    Google Scholar 

  10. Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., Yan, J.: The robustness of hollow CAPTCHAs. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1075–1086. ACM (2013)

    Google Scholar 

  11. Gatys, L.A., Ecker, A.S., Bethge, M.: Image style transfer using convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision And Pattern Recognition, pp. 2414–2423 (2016)

    Google Scholar 

  12. Gregor, K., Danihelka, I., Graves, A., Rezende, D.J., Wierstra, D.: Draw: a recurrent neural network for image generation. arXiv preprint arXiv:1502.04623 (2015)

  13. Hasan, W.K.A.: A survey of current research on captcha. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 7(3), 141–157 (2016)

    Google Scholar 

  14. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  15. Holz, T., Marechal, S., Raynal, F.: New threats and attacks on the world wide web. IEEE Secur. Priv. 4(2), 72–75 (2006)

    Article  Google Scholar 

  16. Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge internet security. Computer 35(4), sulp5–sulp7 (2002)

    Article  Google Scholar 

  17. Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9906, pp. 694–711. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46475-6_43

    Chapter  Google Scholar 

  18. Kwon, H., Kim, Y., Yoon, H., Choi, D.: Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks. Appl. Sci. 7(11), 1186 (2017)

    Article  Google Scholar 

  19. Kwon, H., Kim, Y., Yoon, H., Choi, D.: Captcha image generation systems using generative adversarial networks. IEICE Trans. Inf. Syst. 101(2), 543–546 (2018)

    Article  Google Scholar 

  20. LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)

    Article  Google Scholar 

  21. Li, C., Wand, M.: Combining Markov random fields and convolutional neural networks for image synthesis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2479–2486 (2016)

    Google Scholar 

  22. Moritz, P., Nishihara, R., Jordan, M.: A linearly-convergent stochastic L-BFGS algorithm. In: Artificial Intelligence and Statistics, pp. 249–258 (2016)

    Google Scholar 

  23. Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85–117 (2015)

    Article  Google Scholar 

  24. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. ICLR 2015 (2015)

    Google Scholar 

  25. Soupionis, Y., Gritzalis, D.: Audio CAPTCHA: existing solutions assessment and a new implementation for VoIP telephony. Comput. Secur. 29(5), 603–618 (2010)

    Article  Google Scholar 

  26. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_18

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was supported by the Institute for Information and Communications Technology Promotion (2018-0-00420, 2019-0-00426) and supported by the National Research Foundation of Korea (2017R1C1B2003957, 2017R1A2B4006026).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki-Woong Park .

Editor information

Editors and Affiliations

Appendix

Appendix

Table 1. Model of VGG-19 [24]
Table 2. VGG-19 [24] model parameters.

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kwon, H., Yoon, H., Park, KW. (2020). CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. In: You, I. (eds) Information Security Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11897. Springer, Cham. https://doi.org/10.1007/978-3-030-39303-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39303-8_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39302-1

  • Online ISBN: 978-3-030-39303-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics