Abstract
CAPTCHA is widely used as a security solution to prevent automated attack tools on websites. However, CAPTCHA is difficult to recognize human perception when it gives a lot of distortion to have resistance against the automated attack. In this paper, we propose a method to deceive the machine while maintaining the human perception rate by applying the style transfer method. This method creates a style-plugged-CAPTCHA image by combining the styles of different images while maintaining the content of the original CAPTCHA sample. We used 6 datasets in the actual site and used Tensorflow as the machine learning library. Experimental results show that the proposed method reduces the recognition rate of the DeCAPTCHA system to 3.5% while maintaining human perception.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
GSA Captcha Breaker: GSA - Softwareentwicklung und Analytik GmbH (2017). https://captcha-breaker.gsa-online.de/
Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: OSDI, vol. 16, pp. 265–283 (2016)
Alorini, D., Rawat, D.B.: Automatic spam detection on gulf dialectical Arabic Tweets. In: 2019 International Conference on Computing, Networking and Communications (ICNC), pp. 448–452. IEEE (2019)
Bukac, V., Stavova, V., Nemec, L., Riha, Z., Matyas, V.: Service in denial – clouds going with the winds. Network and System Security. LNCS, vol. 9408, pp. 130–143. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_9
Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 125–138. ACM (2011)
Swamy Das, M., Rao, K.R.M., Balaji, P.: Neural-based hit-count feature extraction method for Telugu script optical character recognition. In: Saini, H.S., Singh, R.K., Patel, V.M., Santhi, K., Ranganayakulu, S.V. (eds.) Innovations in Electronics and Communication Engineering. LNNS, vol. 33, pp. 479–486. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-8204-7_48
Demoulin, H.M., Pedisich, I., Phan, L.T.X., Loo, B.T.: Automated detection and mitigation of application-level asymmetric dos attacks. In: Proceedings of the Afternoon Workshop on Self-Driving Networks, pp. 36–42. ACM (2018)
Gao, H., Tang, M., Liu, Y., Zhang, P., Liu, X.: Research on the security of microsoft’s two-layer captcha. IEEE Trans. Inf. Forensics Secur. 12(7), 1671–1685 (2017)
Gao, H., Wang, W., Fan, Y., Qi, J., Liu, X.: The robustness of “connecting characters together” CAPTCHAs. J. Inf. Sci. Eng. 30(2), 347–369 (2014)
Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., Yan, J.: The robustness of hollow CAPTCHAs. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1075–1086. ACM (2013)
Gatys, L.A., Ecker, A.S., Bethge, M.: Image style transfer using convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision And Pattern Recognition, pp. 2414–2423 (2016)
Gregor, K., Danihelka, I., Graves, A., Rezende, D.J., Wierstra, D.: Draw: a recurrent neural network for image generation. arXiv preprint arXiv:1502.04623 (2015)
Hasan, W.K.A.: A survey of current research on captcha. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 7(3), 141–157 (2016)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Holz, T., Marechal, S., Raynal, F.: New threats and attacks on the world wide web. IEEE Secur. Priv. 4(2), 72–75 (2006)
Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge internet security. Computer 35(4), sulp5–sulp7 (2002)
Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9906, pp. 694–711. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46475-6_43
Kwon, H., Kim, Y., Yoon, H., Choi, D.: Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks. Appl. Sci. 7(11), 1186 (2017)
Kwon, H., Kim, Y., Yoon, H., Choi, D.: Captcha image generation systems using generative adversarial networks. IEICE Trans. Inf. Syst. 101(2), 543–546 (2018)
LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)
Li, C., Wand, M.: Combining Markov random fields and convolutional neural networks for image synthesis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2479–2486 (2016)
Moritz, P., Nishihara, R., Jordan, M.: A linearly-convergent stochastic L-BFGS algorithm. In: Artificial Intelligence and Statistics, pp. 249–258 (2016)
Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85–117 (2015)
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. ICLR 2015 (2015)
Soupionis, Y., Gritzalis, D.: Audio CAPTCHA: existing solutions assessment and a new implementation for VoIP telephony. Comput. Secur. 29(5), 603–618 (2010)
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_18
Acknowledgement
This work was supported by the Institute for Information and Communications Technology Promotion (2018-0-00420, 2019-0-00426) and supported by the National Research Foundation of Korea (2017R1C1B2003957, 2017R1A2B4006026).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kwon, H., Yoon, H., Park, KW. (2020). CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. In: You, I. (eds) Information Security Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11897. Springer, Cham. https://doi.org/10.1007/978-3-030-39303-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-39303-8_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39302-1
Online ISBN: 978-3-030-39303-8
eBook Packages: Computer ScienceComputer Science (R0)