Redirigiendo al acceso original de articulo en 15 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 7 (2023)  /  Artículo
ARTÍCULO
TITULO

A Survey on Adversarial Perturbations and Attacks on CAPTCHAs

Suliman A. Alsuhibany    

Resumen

The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been a topic of interest for several years. The ability of computers to recognize CAPTCHA has significantly increased due to the development of deep learning techniques. To prevent this ability from being utilised, adversarial machine learning has recently been proposed by perturbing CAPTCHA images. As a result of the introduction of various removal methods, this perturbation mechanism can be removed. This paper, thus, presents the first comprehensive survey on adversarial perturbations and attacks on CAPTCHAs. In particular, the art of utilizing deep learning techniques with the aim of breaking CAPTCHAs are reviewed, and the effectiveness of adversarial CAPTCHAs is discussed. Drawing on the reviewed literature, several observations are provided as part of a broader outlook of this research direction. To emphasise adversarial CAPTCHAs as a potential solution for current attacks, a set of perturbation techniques have been suggested for application in adversarial CAPTCHAs.

 Artículos similares

       
 
Huayu Li,Dmitry Namiot     Pág. 9 - 16
This article provides a detailed survey of the so-called adversarial attacks and defenses. These are special modifications to the input data of machine learning systems that are designed to cause machine learning systems to work incor... ver más

 
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud    
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr... ver más
Revista: Algorithms

 
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis and Cherita L. Corbett    
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural ... ver más
Revista: Information

 
Erjon Zoto,Mazaher Kianpour,Stewart James Kowalski,Edgar Alonso Lopez-Rojas     Pág. 65 - 75
Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related policies and what should be don... ver más