Artificial Intelligence outsmarts CAPTCHA security

New algorithm uses human visual intelligence to fool the security system

reCAPTCHA

Vicarious, an AI firm based in California, has created an algorithm which can beat CAPTCHA by mimicking the way the human brain processes images and visual clues.

CAPTCHA, which stands for Completely Automated Public Turing test is used to tell Computers and Humans Apart, was first introduced in the 1990's. Its purpose is to prevent people from using automated bots to set up fake accounts on websites and works by the user solving visual puzzles like recognising distorted letters, digits, symbols or objects. This is because algorithms find it difficult to both match image recognition to semantic meaning and to recognize familiar images that have been distorted.

The researchers at Vicarious claim their software, Recursive Cortical Network (RCN), however, can outsmart CAPTCHAs with minimal training. In fact, previous AI programs required 50,000 times more training than the RCN.

Unlike other processes which use neural networks that require extensive training to solve problems, the RCN works by mimicking how people's visual cortex processes pictures. According to their research published in the journal Science, the algorithm recognises contours, edges, shapes, and textures of an image, and then analyses the pixels to see if they match the outline of an object.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The research revealed that the algorithm was able to accurately guess a CAPTCHA image 66% of the time and can correctly guess an individual character with 81% accuracy.

"We're not seeing attacks on Captcha at the moment, but within three or four months, whatever the researchers have developed will become mainstream, so Captcha's days are numbered," Simon Edwards, a cyber-security architect for data cyber-security firm Trend Micro Europe, told the BBC.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/network-internet/web-browser/354614/microsoft-developer-declares-its-time-to-ditch-ie-for-edge
web browser

Microsoft developer declares it's time to ditch IE for Edge

23 Jan 2020