Table 9: Classification accuracies for watermarked images,
per classifier and parameters allowed.
classifier non-allowed param-
eters
parameters
used
accuracy
LogitBoost / De-
cisionStump
- all 72.585 %
J48 - all 90.935 %
RandomForest - all 92.69 %
RandomForest correlation, compres-
sion rate, size
rest 82.805 %
5.2 Conclusions and Future Work
HumanAuth is a very interesting image-labeling
CAPTCHA. Its basic idea is theoretically more pow-
erful that that behind KittenAuth or ASIRRA, as
it relies on a broader image recognition and clas-
sification problem: it delves into many different
types of pictures (much more than KittenAuth and
ASIRRA), thus relying on a harder AI problem. But,
although the HumanAuth, along with many other
image-labeling CAPTCHAs, are very interesting, our
work has shown that their security is not carefully
studied before they are put into use.
With the attack presented here, we are able to suc-
cessfully bypass the HumanAuth challenge 92+% of
occasions, as proposed by its authors (image library
and watermarking image). This is an incredibly suc-
cessful figure, as normally, CAPTCHAs that are pos-
sible to automatically bypass as low as 5% (or even
less) are considered broken, taking into consideration
that a program can try to bypass the CAPTCHA many
times per second.
The lessons learned in this analysis are useful to
improve other attacks based on more common ap-
proaches -like image processing- or, alternatively, can
be used to improve the security of these CAPTCHA
schemes, and this could be an interesting future work.
One particulary interesting way would be filtering im-
ages taken from image databases, to force then to have
a much similar average size and less standard devia-
tion (among other statistical properties), which could
harden a lot the task of the attacker, without affect-
ing the overall good properties of the CAPTCHA pro-
posal.
REFERENCES
Abadi, M. (1996). Method for selectively restricting access
to computer systems. US Patent no. 6,195,698.
Ahn, L. V., Blum, M., and Langford, J. (2003). Captcha:
Using hard ai problems for security. In Proceedings
of Eurocrypt, pages 294–311. Springer-Verlag.
Chew, M. and Tygar, J. D. (2004). Image recognition
captchas. In Proceedings of the 7th International In-
formation Security Conference, pages 268–279.
Elson, J., Douceur, J. R., Howell, J., and Saul, J. (2007).
Asirra: A captcha that exploits interest-aligned man-
ual image categorization. In Proceedings of 14th ACM
Conference on Computer and Communications Secu-
rity (CCS), Association for Computing Machinery.
Golle, P. (2008). Machine learning attacks against the asirra
captcha. In ACM Conference on Computer and Com-
munications Security, pages 535–542.
Golle, P. and Ducheneaut, N. (2005). Preventing bots from
playing online games. In Proceedings of the ACM
Computers in Entertainment, Vol. 3, No. 3.
Hernandez, J. C. (1997). Compulsive voting. In Proceed-
ings of the 36th Annual 2002 International Carnahan
Conference on Security Technology, pages 124–133.
Hernandez-Castro, C. J. and Ribagorda, A. (2009a). Pit-
falls in captcha design and implementation: the math
captcha, a case study. Computers & Security.
Hernandez-Castro, C. J. and Ribagorda, A. (2009b). Re-
motely telling humans and computers apart: an un-
solved problem. In Proceedings of the iNetSec 2009,
IFIP AICT 309.
Hernandez-Castro, C. J., Ribagorda, A., and Saez, Y.
(2009). Side-channel attacks on labeling captchas.
http://arxiv.org/abs/0908.1185.
Mori, G. and Malik, J. (2003). Recognizing objects in ad-
versarial clutter: Breaking a visual captcha. In Com-
puter Vision and Pattern Recognition CVPR03, pages
134–141.
Naor, M. (1996). Verification of a human in the loop or
identification via the turing test. Technical report,
Weizmann Institute of Science.
von Ahn, L. and Dabbish, L. (2004). Labeling images with
a computer game. In ACM Conference on Human Fac-
tors in Computing Systems, pages 319–326.
Walker, J. (2008). Ent: A pseudorandom number sequence
test program. http://www.fourmilab.ch/random/.
Warner, O. (2006). Kittenauth.
http://www.thepcspy.com/kittenauth.
Winiwarter, W. and Kambayashi, Y. (1997). Y.: A machine
learning workbench in a dood framework. In Proc. of
the Intl. Conf. on Database and Expert Systems Appli-
cations, pages 452–461.
SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
65