An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network

作者: Peiming Wang , Xingshu Chen , Yu Zhang , Haizhou Wang , Chunhui Li

DOI:

关键词:

摘要: As a widely deployed security scheme, text-based CAPTCHAs have become more and difficult to resist machine learning-based attacks. So far, many researchers conducted attacking research on by different companies (such as Microsoft, Amazon, Apple) achieved certain results.However, most of these attacks some shortcomings, such poor portability attack methods, requiring series data preprocessing steps, relying large amounts labeled CAPTCHAs. In this paper, we propose an efficient simple end-to-end method based cycle-consistent generative adversarial networks. Compared with previous studies, our greatly reduces the cost labeling. addition, has high portability. It can common CAPTCHA schemes only modifying few configuration parameters, which makes easier. Firstly, train synthesizers cycle-GAN generate fake samples. Basic recognizers convolutional recurrent neural network are trained data. Subsequently, active transfer learning is employed optimize basic recognizer utilizing tiny real-world Our approach efficiently cracked 10 popular websites, indicating that likely very general. Additionally, analyzed current anti-recognition mechanisms. The results show combination mechanisms improve CAPTCHA, but improvement limited. Conversely, generating complex may resources reduce availability

参考文章(38)
Vojtěch Franc, Václav Hlaváč, License plate character segmentation using hidden markov chains dagm conference on pattern recognition. pp. 385- 392 ,(2005) , 10.1007/11550518_48
Tianqi Chen, Naiyan Wang, Mu Li, Bing Xu, Empirical Evaluation of Rectified Activations in Convolutional Network. arXiv: Learning. ,(2015)
Haichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan, The robustness of hollow CAPTCHAs computer and communications security. pp. 1075- 1086 ,(2013) , 10.1145/2508859.2516732
Oleg Starostenko, Claudia Cruz-Perez, Fernando Uceda-Ponga, Vicente Alarcon-Aquino, Breaking text-based CAPTCHAs with variable word and character orientation Pattern Recognition. ,vol. 48, pp. 1101- 1112 ,(2015) , 10.1016/J.PATCOG.2014.09.006
J Wesley Roberts, Jan Van Aardt, Fethi Ahmed, Assessment of image fusion procedures using entropy, image quality, and multispectral classification Journal of Applied Remote Sensing. ,vol. 2, pp. 023522- ,(2008) , 10.1117/1.2945910
F. Maes, A. Collignon, D. Vandermeulen, G. Marchal, P. Suetens, Multimodality image registration by maximization of mutual information IEEE Transactions on Medical Imaging. ,vol. 16, pp. 187- 198 ,(1997) , 10.1109/42.563664
Manuel Guizar-Sicairos, Samuel T. Thurman, James R. Fienup, Efficient subpixel image registration algorithms Optics Letters. ,vol. 33, pp. 156- 158 ,(2008) , 10.1364/OL.33.000156
Jeff Yan, Ahmad Salah El Ahmad, A low-cost attack on a Microsoft captcha Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 543- 554 ,(2008) , 10.1145/1455770.1455839
G. Mori, J. Malik, Recognizing objects in adversarial clutter: breaking a visual CAPTCHA computer vision and pattern recognition. ,vol. 1, pp. 134- 141 ,(2003) , 10.1109/CVPR.2003.1211347
Elie Bursztein, Matthieu Martin, John Mitchell, Text-based CAPTCHA strengths and weaknesses Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 125- 138 ,(2011) , 10.1145/2046707.2046724