Next Article in Journal
Dual-Band Light Absorption Enhancement in Hyperbolic Rectangular Array
Next Article in Special Issue
FMnet: Iris Segmentation and Recognition by Using Fully and Multi-Scale CNN for Biometric Security
Previous Article in Journal
A Method of Insulator Faults Detection in Aerial Images for High-Voltage Transmission Lines Inspection
Previous Article in Special Issue
Infrared Stripe Correction Algorithm Based on Wavelet Analysis and Gradient Equalization
Article Menu

Export Article

Open AccessArticle

A Low-Cost Approach to Crack Python CAPTCHAs Using AI-Based Chosen-Plaintext Attack

*,† and
Department of Computing Sciences, College at Brockport, State University of New York, Brockport, NY 14420, USA
*
Author to whom correspondence should be addressed.
Current address: 350 New Campus Drive, Brockport, NY 14420, USA.
Appl. Sci. 2019, 9(10), 2010; https://doi.org/10.3390/app9102010
Received: 8 April 2019 / Revised: 7 May 2019 / Accepted: 9 May 2019 / Published: 16 May 2019
(This article belongs to the Special Issue Advanced Intelligent Imaging Technology)
  |  
PDF [1393 KB, uploaded 16 May 2019]
  |     |  

Abstract

CAPTCHA authentication has been challenged by recent technology advances in AI. However, many of the AI advances challenging CAPTCHA are either restricted by a limited amount of labeled CAPTCHA data or are constructed in an expensive or complicated way. In contrast, this paper illustrates a low-cost approach that takes advantage of the nature of open source libraries for an AI-based chosen-plaintext attack. The chosen-plaintext attack described here relies on a deep learning model created and trained on a simple personal computer in a low-cost way. It shows an efficient cracking rate over two open-source Python CAPTCHA Libraries, Claptcha and Captcha. This chosen-plaintext attack method has raised a potential security alert in the era of AI, particularly to small-business owners who use the open-source CAPTCHA libraries. The main contributions of this project include: (1) it is the first low-cost method based on chosen-plaintext attack by using the nature of open-source Python CAPTCHA libraries; (2) it is a novel way to combine TensorFlow object detection and our proposed peak segmentation algorithm with convolutional neural network to improve the recognition accuracy. View Full-Text
Keywords: CAPTCHA security; authentication; open-source Python library; deep learning; convolutional neural network; TensorFlow CAPTCHA security; authentication; open-source Python library; deep learning; convolutional neural network; TensorFlow
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Yu, N.; Darling, K. A Low-Cost Approach to Crack Python CAPTCHAs Using AI-Based Chosen-Plaintext Attack. Appl. Sci. 2019, 9, 2010.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top