We conclude that there is not a strong enough
logic or semantic CAPTCHA to be put into produc-
tion. Also, designers willing to create new logic and
semantic CAPTCHAs should be aware of the com-
mon pitfalls done when estimating their strength.
We do not recommend to pursue research on this
line of CAPTCHA design. We consider at least un-
certain that a possible logic CAPTCHA is anything
else than a chimera. Instead, we recommend future
CAPTCHA designers to explore other ways of creat-
ing a CAPTCHA that have not to do with logic, se-
mantic, or data mining, because of the many possibil-
ities for CAPTCHAs based on those principles to be
flawed.
REFERENCES
Achint, T. and Venu, G. (2008). Generation and perfor-
mance evaluation of synthetic handwritten captchas.
In Proceedings of the First International Conference
on Frontiers in Handwriting Recognition, ICFHR.
Ahn, L. V., Maurer, B., Mcmillen, C., Abraham, D., and
Blum, M. (2008). recaptcha – human-based character
recognition via web security measures.
Athanasopoulos, E. and Antonatos, S. (2006). Enhanced
captchas – using animation to tell humans and com-
puters apart. In Leitold, H. and Markatos, E., editors,
Communications and Multimedia Security, volume
4237 of Lecture Notes in Computer Science, pages
97–108. Springer Berlin – Heidelberg.
Baird, H. S. and Riopka, T. (2005). Scattertype: a read-
ing captcha resistant to segmentation attack. In
Proc., IS&T/SPIE Document Recognition and Re-
trieval Conf, pages 16–20.
Broder, A. (2001). US Patent no. 6,195,698.
Chew, M. and Tygar, J. D. (2004). Image recognition
captchas. In Image Recognition CAPTCHAs, pages
268–279. Springer.
Datta, R., Li, J., and Wang, J. Z. (2005). Imagination: a ro-
bust image-based captcha generation system. In MUL-
TIMEDIA ’05: Proceedings of the 13th annual ACM
international conference on Multimedia, pages 331–
334, New York, NY, USA. ACM.
Elson, J., Douceur, J. R., Howell, J., and Saul, J. (2007).
Asirra: a captcha that exploits interest-aligned manual
image categorization. In CCS ’07: Proceedings of the
14th ACM conference on Computer and communica-
tions security, pages 366–374, New York, NY, USA.
Golle, P. (2009). Machine learning attacks against the asirra
captcha. In Proceedings of the 5th Symposium on Us-
able Privacy and Security, SOUPS 2009, Mountain
View, California, USA, July 15-17, 2009, ACM Inter-
national Conference Proceeding Series. ACM.
Hernandez-Castro, C. J. and Ribagorda, A. (2009a). Pit-
falls in captcha design and implementation: the math
captcha, a case study. Computers & Security.
Hernandez-Castro, C. J. and Ribagorda, A. (2009b). Video-
captchas. In Proceedings of the 5th International Con-
ference on Security and Protection of Information,
Brno.
Hernandez-Castro, C. J., Ribagorda, A., and Hernandez-
Castro, J. C. (2011). Do current logic and semantic
captchas make sense?
Hernandez-Castro, C. J., Ribagorda, A., and Saez, Y.
(2009). Side-channel attack on labeling captchas.
http://arxiv.org/abs/0908.1185.
Hernandez-Castro, C. J., Ribagorda Garnacho, A., and
Saez, Y. (2010a). Side-channel attack on the huma-
nauth captcha. In Proceedings of the International
Conference on Security and Cryptography.
Hernandez-Castro, C. J., Stainton-Ellis, J. D., Ribagorda,
A., and Hernandez-Castro, J. C. (2010b). Shortcom-
ings in captcha design and implementation – captcha2,
a commercial proposal. In Proceedings of the Eighth
International Network Conference (INC2010).
Hoque, M. E., Russomanno, D. J., and Yeasin, M. (2006).
2d captchas from 3d models. In Proceedings of the
IEEE SoutheastCon.
Knight, W. (2007). Newscientist entry on the qrbgs captcha.
Retrieved on the 14th of August, 2010.
Mitra, N. J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H.,
and Cohen-Or, D. (2009). Emerging images. ACM
Transactions on Graphics, 28(5).
Naor, M. (1996). Verification of a human in the loop or
identification via the turing test.
Rusu, A. and Govindaraju, V. (2004). Handwritten captcha
– using the difference in the abilities of humans and
machines in reading handwritten words. Frontiers in
Handwriting Recognition, International Workshop on,
0:226–231.
Stevanovic, R., Topic, G., Skala, K., Stipcevic, M., and
Rogina, B. (2008). Quantum random bit generator
service for monte carlo and other stochastic simula-
tions. In Heidelberg, S.-V. B., editor, Lecture Notes in
Computer Science, volume 4818, pages 508–515.
Vaughan-Nichols, S. J. (2008). Techworld.com article on
fallen captchas. Retrieved on the 14th of August,
2010.
von Ahn, L. and Dabbish, L. (2004). Labeling images with
a computer game. In Press, A., editor, CHI ’04: Pro-
ceedings of the 2004 conference on Human factors in
computing systems, pages 319–326. ACM Press.
Warner, O. (2009). Kittenauth. http://www.thepcspy.com/
kittenauth.
Wilkins, J. (2010). Strong captcha guidelines. http://
bitland.net/captcha.pdf.
Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi,
M., and Cai, K. (2010). Attacks and design of image
recognition captchas. In Proceedings of the 17th ACM
conference on Computer and communications secu-
rity, CCS ’10, pages 187–200, New York, NY, USA.
ACM.
ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
167