Breaking Audio CAPTCHAs full report
#1

Breaking Audio CAPTCHAs



.pdf   Breaking_Audio_CAPTCHAs.pdf (Size: 227.49 KB / Downloads: 0)

Introduction

CAPTCHAs [1] are automated tests designed to tell computers and humans apart by
presenting users with a problem that humans can solve but current computer programs
cannot. Because CAPTCHAs can distinguish between humans and computers with high
probability, they are used for many different security applications: they prevent bots from
voting continuously in online polls, automatically registering for millions of spam email
accounts, automatically purchasing tickets to buy out an event, etc. Once a CAPTCHA is
broken (i.e., computer programs can successfully pass the test), bots can impersonate
humans and gain access to services that they should not. Therefore, it is important for
CAPTCHAs to be secure.


Literature review

To break the audio CAPTCHAs, we derive features from the CAPTCHA audio and use
several machine learning techniques to perform ASR on segments of the CAPTCHA. There
are many popular techniques for extracting features from speech. The three techniques we use
are mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), and
relative spectral transform-PLP (RASTA-PLP). MFCC is one of the most popular speech
feature representations used. Similar to a fast Fourier transform (FFT), MFCC transforms an
audio file into frequency bands, but (unlike FFT) MFCC uses mel-frequency bands, which
are better for approximating the range of frequencies humans hear. PLP was designed to
extract speaker-independent features from speech [4]. Therefore, by using PLP and a variant
such as RASTA-PLP, we were able to train our classifiers to recognize letters and digits
independently of who spoke them. Since many different people recorded the digits used in
one of the types of audio CAPTCHAs we tested, PLP and RASTA-PLP were needed to
extract the features that were most useful for solving them.


Creation of training data

Since automated programs can attempt to pass a CAPTCHA repeatedly, a CAPTCHA is
essentially broken when a program can pass it more than a non-trivial fraction of the time;
e.g., a 5% pass rate is enough.
Our approach to breaking the audio CAPTCHAs began by first splitting the audio files into
segments of noise or words: for our experiments, the words were spoken letters or digits. We
used manual transcriptions of the audio CAPTCHAs to get information regarding the
location of each spoken word within the audio file. We were able to label our segments
accurately by using this information.


Support vector machine
To conduct digit recognition with SVM, we used the C++ implementations of libSVM [8]
version 2.85 with C-SMV and RBF kernel. First, all feature values are scaled to the range of
-1 to 1 as suggested by [8]. The scale parameters are stored so that test samples can be
scaled accordingly. Then, a single multiclass classifier is created for each set of features
using all the segments for a particular type of CAPTCHA. We use cross-validation and grid
search to discover the optimal slack penalty (C=32) and kernel parameter (γ=0.011).
Reply
#2

to get information about the topic "Captchas" full report ppt and related topic refer the page link bellow

http://studentbank.in/report-breaking-au...ull-report

http://studentbank.in/report-captchas?pi...e=threaded

http://studentbank.in/report-evaluating-...visual-use

http://studentbank.in/report-captchas?pi...e=threaded
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: captchas de fileserve para jdownloader, seminar on 3d captchas, regenerative breaking systemntpc, project report on electromagnetic breaking system, jdownloader captchas hotfile, mechanicalengineeringproject emergency breaking, hydraulic breaking system seminar report and ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,781 09-07-2016, 12:36 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,840 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,547 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,130 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,783 24-10-2014, 11:49 PM
Last Post: jaseela123d
  TERRORISM full report project uploader 2 2,278 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,449 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,480 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,446 11-01-2013, 10:18 AM
Last Post: seminar details
  SOLAR POWER TOWER full report seminar details 1 2,334 30-11-2012, 01:39 PM
Last Post: seminar details

Forum Jump: