The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2012 vol.16)
pp: 44-51
Ahmad El Ahmad , Newcastle University,UK
Jeff Yan , Newcastle University, UK
Wai-Yin Ng , Chinese University of Hong Kong
ABSTRACT
<p>Most user interfaces use color, which can greatly enhance their design. Because the use of color is typically a usability issue, it rarely causes security failures. However, using color when designing CAPTCHAs, a standard security technology that many commercial websites apply widely, can have an impact on usability and interesting but critical implications for security. Here, the authors examine some CAPTCHAs to determine whether their use of color negatively affects their usability, security, or both.</p>
INDEX TERMS
CAPTCHAs, color, robustness, usability, Internet security
CITATION
Ahmad El Ahmad, Jeff Yan, Wai-Yin Ng, "CAPTCHA Design: Color, Usability, and Security", IEEE Internet Computing, vol.16, no. 2, pp. 44-51, March-April 2012, doi:10.1109/MIC.2011.102
REFERENCES
1. L.W. MacDonald, "Using Color Effectively in Computer Graphics," IEEE Computer Graphics & Applications, vol. 19, no. 4, 1999, pp. 20–35.
2. L. von Ahn, M. Blum, and J. Langford, "Telling Humans and Computer Apart Automatically," Comm. ACM, vol. 47, no. 2, 2004, pp. 56–60.
3. A.E. Ahmad and J. Yan, Colour, Usability and Security: A Case Study, tech. report CS-TR 1203, School of Computing Science, Newcastle Univ., May 2010; www.cs.ncl.ac.uk/publications/trs/papers 1203.pdf.
4. J. Yan and A.E. Ahmad, "Usability of CAPTCHAs or Usability Issues in CAPTCHA Design," Proc. 4th Symp. Usable Privacy and Security (SOUPS 08), ACM Press, 2008, pp. 44–52.
5. "Inaccessibility of CAPTCHA — Alternatives to Visual Turing Tests on the Web," W3C Working Group note, 23 Nov. 2005; www.w3.org/TRturingtest.
6. K. Chellapilla et al., "Building Segmentation-Based Human-Friendly Human Interaction Proofs," Proc. 2nd Int'l Workshop Human Interaction Proofs, LNCS 3517, Springer, 2005, pp. 1–26.
7. T. Converse, "CAPTCHA Generation as a Web Service," Proc. 2nd Int'l Workshop Human Interactive Proofs (HIP 05), LNCS 3517, Springer, 2005, pp. 82–96.
8. J. Yan and A.E. Ahmad, "A Low-Cost Attack on a Microsoft CAPTCHA," Proc. 15th ACM Conf. Computer and Communications Security (CCS 08), ACM Press, 2008, pp. 543–554.
9. K. Chellapilla et al., "Computers Beat Humans at Single Character Recognition in Reading-Based Human Interaction Proofs," Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc/2005/papers160.pdf.
10. G. Moy et al., "Distortion Estimation Techniques in Solving Visual CAPTCHAs," Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition (CVPR 04), IEEE CS Press, 2004, pp. 23–28.
11. G. Mori and J. Malik, "Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA," Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition (CVPR 03), IEEE CS Press, 2003, pp. 134–141.
12. H. Yeend, "Breaking CAPTCHAs without Using OCR," blog, 30 Nov. 2005, www.puremango.co.ukcm_breaking_captcha_115.php .
13. J. Yan and A.E. Ahmad, "Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms," Proc. Ann. Computer Security Applications Conf. (ACSAC 07), IEEE CS Press, 2007, pp. 279–291.
14. H.S. Baird, M.A. Moll, and S.Y. Wang, "A Highly Legible CAPTCHA that Resists Segmentation Attacks," Proc. 2nd Int'l Workshop Human Interaction Proofs, LNCS 3517, Springer, 2005, pp. 27–41.
15. A.E. Ahmad, J. Yan, and L. Marshall, "The Robustness of a New CAPTCHA," Proc. 2010 European Workshop System Security (EuroSec 10), ACM Press, 2010, pp. 36–41.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool