Artificial Intelligence outsmarts CAPTCHA security

New algorithm uses human visual intelligence to fool the security system

reCAPTCHA

Vicarious, an AI firm based in California, has created an algorithm which can beat CAPTCHA by mimicking the way the human brain processes images and visual clues.

CAPTCHA, which stands for Completely Automated Public Turing test is used to tell Computers and Humans Apart, was first introduced in the 1990's. Its purpose is to prevent people from using automated bots to set up fake accounts on websites and works by the user solving visual puzzles like recognising distorted letters, digits, symbols or objects. This is because algorithms find it difficult to both match image recognition to semantic meaning and to recognize familiar images that have been distorted.

The researchers at Vicarious claim their software, Recursive Cortical Network (RCN), however, can outsmart CAPTCHAs with minimal training. In fact, previous AI programs required 50,000 times more training than the RCN.

Unlike other processes which use neural networks that require extensive training to solve problems, the RCN works by mimicking how people's visual cortex processes pictures. According to their research published in the journal Science, the algorithm recognises contours, edges, shapes, and textures of an image, and then analyses the pixels to see if they match the outline of an object.

The research revealed that the algorithm was able to accurately guess a CAPTCHA image 66% of the time and can correctly guess an individual character with 81% accuracy.

"We're not seeing attacks on Captcha at the moment, but within three or four months, whatever the researchers have developed will become mainstream, so Captcha's days are numbered," Simon Edwards, a cyber-security architect for data cyber-security firm Trend Micro Europe, told the BBC.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

What is AES encryption?
Advanced Encryption Standard (AES)

What is AES encryption?

30 Nov 2020
UK's Huawei 5G ban brought forward to September 2021
Security

UK's Huawei 5G ban brought forward to September 2021

30 Nov 2020
Hacker claims to be selling C-suite executives' Microsoft credentials
Security

Hacker claims to be selling C-suite executives' Microsoft credentials

30 Nov 2020
What are biometrics?
Security

What are biometrics?

27 Nov 2020

Most Popular

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate
Mobile Phones

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate

26 Nov 2020
What is phishing?
phishing

What is phishing?

25 Nov 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020