reCAPTCHA is a user-dialogue system originally developed by Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum at Carnegie Mellon University's main Pittsburgh campus, and acquired by Google in September 2009. Like the CAPTCHA interface, reCAPTCHA asks users to enter words seen in distorted text images onscreen. By presenting two words it both protects websites from bots attempting to access restricted areas and helps digitize the text of books.
The reCAPTCHA service supplies subscribing websites with images of words that optical character recognition (OCR) software has been unable to read. The subscribing websites (whose purposes are generally unrelated to the book digitization project) present these images for humans to decipher as CAPTCHA words, as part of their normal validation procedures. They then return the results to the reCAPTCHA service, which sends the results to the digitization projects.
reCAPTCHA has worked on digitizing the archives of The New York Times and books from Google Books. As of 2012, thirty years of The New York Times had been digitized and the project planned to have completed the remaining years by the end of 2013. The now completed archive of The New York Times can be searched from the New York Times Article Archive, where more than 13 million articles in total have been archived, dating from 1851 to the present day.
The system has been reported as displaying over 100 million CAPTCHAs every day, on sites such as Facebook, TicketMaster, Twitter, 4chan, CNN.com, StumbleUpon, Craigslist (since June 2008), and the U.S. National Telecommunications and Information Administration's digital TV converter box coupon program website (as part of the US DTV transition).
reCAPTCHA's slogan is "Stop spam, read books."
Distributed Proofreaders was the first project to volunteer its time to decipher scanned text that could not be read by OCR. It works with Project Gutenberg to digitize public domain material and uses methods quite different from reCAPTCHA.
The reCAPTCHA program originated with Guatemalan computer scientist Luis von Ahn, and was aided by a MacArthur Fellowship. An early CAPTCHA developer, he realized "he had unwittingly created a system that was frittering away, in ten-second increments, millions of hours of a most precious resource: human brain cycles".
Scanned text is subjected to analysis by two different optical character recognition programs. Their respective outputs are then aligned with each other by standard string-matching algorithms and compared both to each other and to an English dictionary. Any word that is deciphered differently by both OCR programs or that is not in the English dictionary is marked as "suspicious" and converted into a CAPTCHA. The suspicious word is displayed, out of context, sometimes along with a control word already known. If the human types the control word correctly, then the response to the questionable word is accepted as probably valid. If enough users were to correctly type the control word, but incorrectly type the 2nd word which OCR had failed to recognize, then the digital version of documents could end up containing the incorrect word. The identification performed by each OCR program is given a value of 0.5 points, and each interpretation by a human is given a full point. Once a given identification hits 2.5 points, the word is considered valid. Those words that are consistently given a single identity by human judges are later recycled as control words. If the first three guesses match each other but do not match either of the OCRs, they are considered a correct answer, and the word becomes a control word. When six users reject a word before any correct spelling is chosen, the word is discarded as unreadable.
The original reCAPTCHA method was designed to show the questionable words separately, as out-of-context correction, rather than in use, such as within a phrase of 5 words from the original document. Also, the control word might mislead context for the 2nd word, such as a request of "/metal/ /fife/" being entered as "metal file" due to the logical connection of filing with a metal tool being considered more common than the musical instrument "fife".
As of September 2014, reCAPCHA doesn't use the control word anymore, either always or in some cases.
The use of reCAPTCHA has been labelled a "a serious barrier to internet use" for people with sight problems or disabilities such as dyslexia by a BBC journalist.
Andrew Munsell, in his article "Captchas Are Becoming Ridiculous" states "A couple of years ago, I don’t remember being truly baffled by a captcha. In fact, reCAPTCHA was one of the better systems I’d seen. It wasn’t difficult to solve, and it seemed to work when I used it on my own websites."  Munsell goes on to state, after encountering a series of unintelligible images that despite refreshing "Again, and again, and again. The captchas were not only difficult for a computer to read, but impossible for a human." Munsell then provided numerous examples.
The main purpose of a CAPTCHA system is to prevent automated access to a system by computer programs or "bots". On 14 December 2009, Jonathan Wilkins released a paper describing weaknesses in reCAPTCHA that allowed a solve rate of 18%.
On 1 August 2010, Chad Houck gave a presentation to the DEF CON 18 Hacking Conference detailing a method to reverse the distortion added to images which allowed a computer program to determine a valid response 10% of the time. The reCAPTCHA system was modified on 21 July 2010, before Houck was to speak on his method. Houck modified his method to what he described as an "easier" CAPTCHA to determine a valid response 31.8% of the time. Houck also mentioned security defenses in the system, including a high security lock out if an invalid response is given 32 times in a row.
On 26 May 2012, Adam, C-P and Jeffball of DC949 gave a presentation at the LayerOne hacker conference detailing how they were able to achieve an automated solution with an accuracy rate of 99.1%. Their tactic was to use techniques from machine learning, a subfield of artificial intelligence, to analyse the audio version of reCAPTCHA which is available for the visually impaired. Google released a new version of reCAPTCHA just hours before their talk, making major changes to both the audio and visual versions of their service. In this release, the audio version was increased in length from 8 seconds to 30 seconds, and is much more difficult to understand, both for humans as well as bots. In response to this update and the following one, the members of DC949 released two more versions of Stiltwalker which beat reCAPTCHA with an accuracy of 60.95% and 59.4% respectively. After each successive break, Google updated reCAPTCHA within a few days. According to DC949, they often reverted to features that had been previously hacked.
In an August 2012 presentation given at BsidesLV 2012, DC949 called the latest version "unfathomably impossible for humans" - they were not able to solve them manually either. The web accessibility organization WebAIM reported in May 2012, "Over 90% of respondents [screen reader users] find CAPTCHA to be very or somewhat difficult.".
On 27 June 2012, Claudia Cruz, Fernando Uceda, and Leobardo Reyes (a group of students from México) published a paper showing a system running on reCAPTCHA images with an accuracy of 82%. The authors have not said if their system can solve recent reCAPTCHA images, although they claim their work to be intelligent OCR and robust to some changes[clarification needed].
reCAPTCHA frequently modifies its system, requiring hackers to frequently update their methods of decoding, which may frustrate potential abusers.
Only words that both OCR programs failed to recognize are used as control words. Thus, any program that can recognize these words with nonnegligible probability would represent an improvement over state of the art OCR programs.
reCAPTCHA had also created project Mailhide, which protects email addresses on web pages from being harvested by spammers. By default, the email address is converted into a format that does not allow a crawler to see the full email address; for example, "firstname.lastname@example.org" would be converted to "mai...@example.com". The visitor would then click on the "..." and solve the CAPTCHA in order to obtain the full email address. One can also edit the pop-up code so that none of the address is visible.
- "Teaching computers to read: Google acquires reCAPTCHA". Google. Retrieved 2009-09-16.
- Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum (2008). "reCAPTCHA: Human-Based Character Recognition via Web Security Measures" (PDF). Science 321 (5895): 1465–1468. Bibcode:2008Sci...321.1465V. doi:10.1126/science.1160379. PMID 18703711.
- "reCAPTCHA FAQ". Google. Retrieved 2011-06-12.
- Rubens, Paul (2007-10-02). "Spam weapon helps preserve books". BBC.
- "Fight Spam, Digitize Books". Craigslist Blog. June 2008.
- TV Converter Box Program
- "reCAPTCHA: Stop Spam, Read Books". Google. Retrieved 2013-07-10.
- ""Full Interview: Luis von Ahn on Duolingo", Spark, November 2011". Canadian Broadcasting Corporation. 2011-11-30. Retrieved 2013-07-10.
- Hutchinson, Alex (March 2009). "Human Resources: The job you didn't even know you had". The Walrus. pp. 15–16.
- Timmer, John (2008-08-14). "CAPTCHAs work? for digitizing old, damaged texts, manuscripts". Ars Technica. Retrieved 2008-12-09.
- Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum (2008). "reCAPTCHA: Human-Based Character Recognition via Web Security Measures" (PDF). Science 321 (5895): 1465–1468. doi:10.1126/science.1160379. PMID 18703711.
- ""questionable validity of results if words are presented out of context", Google Groups, August 29, 2008". Google. Retrieved 2013-07-10.
- March 29th, 2012 (2012-03-29). "Google Now Using ReCAPTCHA To Decode Street View Addresses". TechCrunch. Retrieved 2013-07-10.
- "Google Groups". groups.google.com. Retrieved 2014-09-22.
- "FAQ". reCAPTCHA.net.
- "reCAPTCHA: Stop Spam, Read Books". Google. Retrieved 2014-01-14.
- "Developer's Guide - reCAPTCHA — Google Developers". Google. Retrieved 2014-01-14.
- "BBC News - The evolution of those annoying online security tests". bbc.com. Retrieved 2014-09-22.
- "Captchas Are Becoming Ridiculous | Andrew Munsell". andrewmunsell.com. Retrieved 2014-09-22.
- "Strong CAPTCHA Guidelines".
- "Google's reCAPTCHA busted by new attack".
- "Google's reCAPTCHA dented".
- "Def Con 18 Speakers". defcon.org.
- "Decoding reCAPTCHA Paper". Chad Houck.
- "Decoding reCAPTCHA Power Point". Chad Houck.
- "Project Stiltwalker".
- "Screen Reader User Survey #4 Results".
- Claudia Cruz-Perez; Oleg Starostenko; Fernando Uceda-Ponga; Vicente Alarcon-Aquino; Leobardo Reyes-Cabrera (30 June 2012). "Breaking reCAPTCHAs with Unpredictable Collapse: Heuristic Character Segmentation and Recognition". In Carrasco-Ochoa, Jesús Ariel; Martínez-Trinidad, José Francisco; Olvera López, José Arturo; Boyer, Kim L. Pattern Recognition. Lecture Notes in Computer Science 7329. México. pp. 155–165. doi:10.1007/978-3-642-31149-9_16. ISBN 978-3-642-31148-2.
- "Mailhide: Free Spam Protection". reCAPTCHA.net.
|Wikimedia Commons has media related to ReCAPTCHA.|
- Official website
- ReCAPTCHA: The job you didn't even know you had Two-page article in The Walrus magazine
- Luis von Ahn, Benjamin Maurer, Colin McMillen, David Abraham and Manuel Blum. 2008. "reCAPTCHA: Human-Based Character Recognition via Web Security Measures" Science 12 September 2008: Vol. 321 no. 5895 pp. 1465–1468. http://dx.doi.org/10.1126/science.1160379
- "Luis von Ahn: Massive-scale online collaboration", YouTube video of the "TEDtalksDirector" channel, uploaded 2011-12-06.
- Luis von Ahn at TED
- Example of an unexpected risk in using reCAPTCHA