Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211100074-5.doi: 10.11896/jsjkx.211100074

• Information Security • Previous Articles     Next Articles

Adversarial Character CAPTCHA Generation Method Based on Differential Evolution Algorithm

YANG Hao, YAN Qiao   

  1. School of Computer Science and Software of Engineering,Shenzhen University,Shenzhen,Guangdong 518000,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:YANG Hao,born in 1995,postgraduate.His main research interests include network security and machine learning.
    YAN Qiao,born in 1972,Ph.D,professor,is a member of China Computer Federation.Her main research interests include network security,software-defined networking and adversarial machine learning.
  • Supported by:
    National Natural Science Foundation of China(61976142) and Shenzhen Basic Research Program(JCYJ20210324093609025).

Abstract: CAPTCHA is widely used in the registration and login process of websites and applications to distinguish normal users from programs.However,with the advancement of deep learning,many deep learning recognition methods for CAPTCHA have been proposed.CAPTCHA can no longer distinguish human users from computer programs effectively,and its security has been greatly challenged.The adversarial example can make the output result of neural network completely different from its original predicted result.Recent researches find that combining adversarial example with CAPTCHA is an effective method to resist the attack of deep learning recognition system.Researchers use adversarial example generation methods to generate adversarial chara-cter CAPTCHA to defend against deep learning methods.Existing adversarial character CAPTCHA generation methods are white-box methods that require knowledge of the structural parameter information of the attacking network.However,practical CAPTCHA application scenarios usually do not know the information of the attacking network,so robust CAPTCHA should be able to perform well without knowing the attack information.In this paper,a character-based adversarial CAPTCHA generation method(ACoDE) based on differential evolution algorithm is proposed to improve the solving ability of the algorithm by optimizing the scaling factor in the mutation process and the population evolution strategy.Without knowing the information of the attacking network,the adversarial examples generated by the proposed method are more capable of misleading the neural network.The adversarial example generation method is used for the character CAPTCHA dataset,and the success rate of the current state-of-the-art CNN character-based CAPTCHA recognition system reduce to less than 30%.The visual effect of the adversarial CAPTCHA is satisfactory when compare with other white-box methods.

Key words: Deep learning, Adversarial examples, Differential evolution algorithm, CAPTCHA, Network security

CLC Number: 

  • TP391
[1]WANG Z,SHI P.CAPTCHA Recognition Method Based on CNN with Focal Loss[J].Complexity,2021(2):1-10.
[2]GAO H C,WANG W,FAN Y,et al.The Robustness of “Connecting Characters Together” CAPTCHAs[J].Journal of Information Science and Engineering,2014,30(2):347-369.
[3]VON AHN L,MAURER B,MCMILLEN C,et al.Recaptcha:Human-based character recognition via websecurity measures[J].Science,2008,321(5895):1465-1468.
[4]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining and harnessing adversarial examples[J].arXiv:1412.6572,2014.
[5]KWON H,YOON H,PARK K W.Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods[J].IEICE Transactions on Information and Systems,2020,E103-D(4):879-882.
[6]SU J,VARGAS D V,KOUICHI S.One pixel attack for fooling deep neural networks[J].IEEE Transactions on Evolutionary Computation,2019,23(5):828-841.
[7]TANG Z Y,TIAN C X,LI J,et al.A text-based CAPTCHA re-cognition method based on conditional generative adversarial networks[J],Chinese Journal of Computers,2020,43(8):199-204.
[8]CAO Y R,LU L,GONG Y H,et al.A Captcha RecognitionMethod based on Adversarial Network[J].Computer Enginee-ring and Applications,2020,56(8):199-204.
[9]SHU Y,XU Y.End-to-End Captcha Recognition Using DeepCNN-RNN Network[C]//2019 IEEE 3rd Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC).2019:54-58.
[10]SZEGEDY C,ZAREMBA W,SUTSKEVER I,et al.Intriguing properties of neural networks[C]//International Conference on Learning Representations.2014.
[11]MOOSAVI-DEZFOOLI S M,FAWZI A,FAWZI O,et al.Universal adversarial perturbations[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition(CVPR).2017:86-94.
[12]OSADCHY M,HERNAN DE Z-CASTRO J,GIBSON S,et al.No Bot Expects the DeepCAPTCHA! Introducing Immutable AdversarialExamples,With Applications to CAPTCHA Generation[J].IEEE Transactions on Information Forensics and Secu-rity,2017,12(11):2640-2653.
[13]SHEKHAR H,MOH M,MOH T.Exploring Adversaries to Defend Audio CAPTCHA[C]//2019 18th IEEE International Conference On Machine Learning And Applications(ICMLA).2019:1155-1161.
[14]HITAJ D,HITAJ B,JAJODIA S,et al.Capture the Bot:Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks[J].Intelligent Systems,IEEE,2020,36(5):104-112.
[15]DAS S,SUGANTHAN P N.Differential Evolution:A Survey of the State-of-the-Art[J].IEEE Transactions on Evolutionary Computation,2011,15(1):4-31.
[1] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[4] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[5] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[6] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[7] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[8] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[9] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[10] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[11] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[12] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[13] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[14] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[15] ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!