Sciweavers

12 search results - page 2 / 3
» Attacks and design of image recognition CAPTCHAs
Sort
View
CVPR
2003
IEEE
14 years 6 months ago
Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA
In this paper we explore object recognition in clutter. We test our object recognition techniques on Gimpy and EZGimpy, examples of visual CAPTCHAs. A CAPTCHA ("Completely Au...
Greg Mori, Jitendra Malik
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
13 years 10 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
13 years 10 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
ICDAR
2005
IEEE
13 years 10 months ago
ScatterType: A Legible but Hard-to-Segment CAPTCHA
The ScatterType CAPTCHA, designed to resist character– segmentation attacks and shown to be highly legible to human readers, is analyzed for vulnerabilities and is offered for e...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang