AI-driven biometric CAPTCHA: defending against automated threats in web security
DOI:
https://doi.org/10.14419/fab5t109Keywords:
Artificial Intelligence; B3DA; CAPTCHA; DDOS; OCR.Abstract
Web security is a critical aspect of modern life, as the increasing reliance on internet services exposes systems to various cyber threats. Au-Automated hacking tools exploiting registration systems with false information often led to bandwidth issues and Distributed Denial of Service (DDoS) attacks. CAPTCHA remains a widely used mechanism for distinguishing between humans and automated systems. However, simple CAPTCHAs are easily bypassed by advanced AI, while complex ones can frustrate genuine users. This research presents an innovative B3DA (Biometric 3D Animated) CAPTCHA algorithm that integrates AI for Face Recognition with randomly generated Three-dimensional animated characters. The proposed solution creates CAPTCHAs that are intuitive for people to handle but pose significant challenges in the context of automated systems. By combining handwritten 3D animated characters into randomized strings, the B3DA CAPTCHA algorithm enhances security and usability. Experimental results validate the algorithm's robustness against bot-driven attacks, demonstrating its ability to withstand sophisticated breaches while leveraging machine learning for continuous improvement. The B3DA CAPTCHA algorithm offers a transformative approach to CAPTCHA design, effectively balancing user convenience and resistance to automated hacking tools, marking a significant advancement in web security solutions.
References
- K. Sukhani, S. Sawant, S. Maniar, and R. Pawar, "Automating the bypass of image-based CAPTCHA and assessing security," in 12th Internation-al Conference on Computer Communication and Network Technology (ICCCNT), 2021, pp. 01–08. https://doi.org/10.1109/ICCCNT51525.2021.9580020.
- S. Khawandi, A. Ismail, and F. Abdallah, "Different implemented CAPTCHAs and breaking methods," International Research Journal of Engi-neering and Technology (IRJET), vol. 6, no. 2, 2019. [Online]. Available: https://www.researchgate.net/publication/335961595_Different_Implemented_Captchas_and_Breaking_Methods.
- M. Jadhav, N. Kulkarni, and O. Walhekar, "Doodling based CAPTCHA authentication system," in Asian Conference on Innovation Technology (ASIANCON), 2021, pp. 1–5. https://doi.org/10.1109/ASIANCON51346.2021.9544570.
- K. Shivani and R. K. Challa, "CAPTCHA: A systematic review," in IEEE International Conference on Advent Trends in Multidisciplinary Research and Innovation (ICATMRI), 2020, pp. 1–8. https://doi.org/10.1109/ICATMRI51801.2020.9398494.
- M. A. Sheheryar, P. K. Mishra, and A. K. Sahoo, "A review on CAPTCHA generation and evaluation techniques," ARPN Journal, vol. 11, pp. 5800–5811, 2016.
- Y. Zhang et al., "A survey of research on CAPTCHA designing and breaking techniques," in 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (Trust-Com/BigDataSE), 2019, pp. 75–84. https://doi.org/10.1109/TrustCom/BigDataSE.2019.00020.
- S. Azad and K. Jain, "CAPTCHA: Attacks and weaknesses against OCR technology," Global Journal of Computer Science and Technology: Neu-ral & Artificial Intelligence, vol. 13, no. 3, pp. 14–18, 2013.
- Y. S. Aljarbou, "Improving current CAPTCHA systems," in 2nd International Conference on Computer Applications & Information Security (IC-CAIS), 2019, pp. 1–6. https://doi.org/10.1109/CAIS.2019.8769466.
- M. H. Aldosari and A. A. Al-Daraiseh, "Strong multilingual CAPTCHA based on handwritten characters," in 7th International Conference on In-formation and Communication Systems (ICICS), 2016, pp. 239–245. https://doi.org/10.1109/IACS.2016.7476118.
- C. Lei, "Image CAPTCHA technology research based on the mechanism of the finger-guessing game," in Third International Conference on Cy-berspace Technology (CCT 2015), 2015, pp. 1–4. https://doi.org/10.1049/cp.2015.0843.
- N. P. Bora and D. C. Jain, "A web authentication biometric 3D animated CAPTCHA system using artificial intelligence and machine learning ap-proach," Journal of Artificial Intelligence and Technology, vol. 3, no. 3, pp. 126–133, 2023. https://doi.org/10.37965/jait.2023.0216.
- S. Singhal, A. Sharma, S. Garg, and N. Jatana, "Vulnerabilities of CAPTCHA used by IRCTC and an alternative approach of Split Motion Text (SMT) CAPTCHA," in 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), 2015, pp. 1–6. https://doi.org/10.1109/ICRITO.2015.7359287.
- C. J. Chen, Y. W. Wang, and W. P. Fang, "A study on CAPTCHA recognition," in Tenth International Conference on Intelligent Information Hid-ing and Multimedia Signal Processing, 2014, pp. 395–398. https://doi.org/10.1109/IIH-MSP.2014.105.
- F. A. B. H. Ali and F. B. Karim, "Development of CAPTCHA system based on puzzle," in 1st International Conference on Computer, Communi-cations, and Control Technology (I4CT), 2014, pp. 426–428. https://doi.org/10.1109/I4CT.2014.6914219.
- N. C. Mutha and D. S. D. Sharma, "3D handwritten animated CAPTCHA algorithm: Web security," International Journal of Engineering Research and Technology (IJERT), vol. 2, no. 10, pp. 2071–2076, 2013.
- M. Rao and N. Singh, "Random handwritten CAPTCHA: Web security with a difference," International Journal of Information Technology and Computer Science, vol. 4, pp. 53–58, 2012. https://doi.org/10.5815/ijitcs.2012.09.07.
- G. Goswami, R. Singh, M. Vatsa, B. Powell, and A. Noore, "Face recognition CAPTCHA," in IEEE Fifth International Conference on Biometrics: Theory, Applications, and Systems (BTAS), 2012, pp. 412–417. https://doi.org/10.1109/BTAS.2012.6374608.
- D. D’Souza, P. C. Polina, and R. V. Yampolskiy, "Avatar CAPTCHA: Telling computers and humans apart via face classification," in IEEE Inter-national Conference on Electro/Information Technology, 2012, pp. 1–6. https://doi.org/10.1109/EIT.2012.6220734.
- J. Cui, J. Mei, W. Zhang, X. Wang, and D. Zhang, "A CAPTCHA implementation based on moving objects recognition problem," in International Conference on E-Business and E-Government, 2010, pp. 1277–1280. https://doi.org/10.1109/ICEE.2010.326.
- J. Cui, J. Mei, X. Wang, D. Zhang, and W. Zhang, "A CAPTCHA implementation based on 3D animation," in International Conference on Multi-media Information Networking and Security, 2009, pp. 179–182. https://doi.org/10.1109/MINES.2009.298.
- M. Chew and J. D. Tygar, "Image recognition CAPTCHAs," in Proceedings of the 2004 International Conference on Financial Cryptography, 2004, pp. 268–279. https://doi.org/10.1007/978-3-540-30144-8_23.
- L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Communications of the ACM, vol. 47, no. 2, pp. 56–60, 2004. https://doi.org/10.1145/966389.966390.
- von Ahn L, Blum M & Langford J (2004), Telling humans and computers apart automatically. Communications of the ACM 47(2), 56–60. https://doi.org/10.1145/966389.966390.
- Mori G & Malik J (2003), Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. Proceedings of the 2003 IEEE Computer Socie-ty Conference on Computer Vision and Pattern Recognition, Vol. 1, Madison, WI, USA. https://doi.org/10.1109/CVPR.2003.1211347.
- Claburn T (n.d.), Yahoo’s CAPTCHA security reportedly broken. Available online: https://www.informationweek.com/government/yahoo-s-captcha-security-reportedly-broken.
- Bursztein E, Bethard S, Fabry C, Mitchell JC & Jurafsky D (2010), How good are humans at solving CAPTCHAs? A large-scale evaluation. Pro-ceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 399–413. https://doi.org/10.1109/SP.2010.31.
- Yampolskiy, R. V. (2012). Human computer interaction-based CAPTCHA: A survey. International Journal of Human-Computer Studies, 70(11), 831–866. https://doi.org/10.1016/j.ijhcs.2012.05.009.
- Meng, X., Liu, X., & Wang, Y. (2021). Voice CAPTCHA authentication via deep learning. Computers & Security, 104, 102202. https://doi.org/10.1016/j.cose.2021.102202.
- Zhang, H., Liu, J., Wang, Y., & Liu, X. (2022). CAPTCHA breaking using vision transformers. Pattern Recognition Letters, 155, 50-57. https://doi.org/10.1016/j.patrec.2021.12.010.
- X. Nian, J. Liu, Y. Han, and Y. Zhang, "A deep learning‐based attack on text CAPTCHAs using object detection techniques," IET Information Se-curity, vol. 17, no. 2, pp. 85–94, Mar. 2023, https://doi.org/10.1049/ise2.12047.
- reCAPTCHA (n.d.), available online: https://www.google.com/recaptcha/about.
- IRCTC Train Search (n.d.), available online: https://www.irctc.co.in/nget/train-search.
- NLP CAPTCHA (n.d.), available online: https://nlpcaptcha.in/en/index.html.
- SBI Online (n.d.), available online: https://www.onlinesbi.com.
- Online OCR (n.d.), available online: https://www.onlineocr.net.
- Free Online OCR (n.d.), available online: www.free-online-ocr.com.
- New OCR (n.d.), available online: https://www.newocr.com.
- i2OCR (n.d.), available online: http://www.i2ocr.com.
- CAPTCHA (n.d.), available online: http://www.captcha.net/.
- HubSpot Blog (n.d.), Control spam by integrating Google Invisible reCAPTCHA on your WordPress site. available online: https://blog.hubspot.com/website/control-spam-integrating-google-invisible-recaptcha-wordpress-site.
Downloads
How to Cite
Received date: March 16, 2025
Accepted date: April 8, 2025
Published date: April 13, 2025