• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Emerging-Image Motion CAPTCHAs

Vulnerabilities of Existing Designs, and Countermeasures

Based on the notion of “emergence”, Xu et al. (Usenix Security 2012; TDSC 2013) developed the first concrete instantiation of emerging-image moving-object (EIMO) CAPTCHAs using 2D hollow objects (codewords), shown to be usable and believed to be secure. In this work, we highlight the hidden security weaknesses of such a 2D EIMO CAPTCHA design. A key vulnerability is that the camera projection on 2D objects is constant (unlike 3D objects), making it possible to reconstruct the underlying codewords by superimposing and aggregating the temporally scattered parts of the object extracted from consecutive frames. We design and implement an automated attack framework to defeat this design using image processing techniques, and show that its accuracy in recognizing moving codewords is up to 89.2%, under different parameterizations. Our framework can be broadly used to undermine the security of different instances of 2D EIMO CAPTCHAs (not just the current state-of-the-art by Xu et al.), given the generalized and robust back-end theories in our attack, namely the methods to locate a codeword, reduce noises and accumulate objects’ contour information from consecutive frames corresponding to multiple time periods. As a countermeasure, we propose a fundamentally different design of EIMO CAPTCHAs based on pseudo 3D objects, and examine its security as well as usability. We argue that this design can resist our attack against 2D EIMO CAPTCHAs, although at the cost of reduced usability compared to the – now insecure –2D EIMO CAPTCHAs.

Comparison between the original EI-Nu CAPTCHA and our design with codeword “KHZ”. (a) A single frame image. (b) A single binary mask after removing the background scene. (c) Superimposition of 2 consecutive binary masks. (d) Superimposition of 5 consecutive binary masks.

Comparison between the original EI-Nu CAPTCHA and our design with codeword “KHZ”. (a) A single frame image. (b) A single binary mask after removing the background scene. (c) Superimposition of 2 consecutive binary masks. (d) Superimposition of 5 consecutive binary masks.

People

Faculty

  • Nitesh Saxena
  • Chengcui Zhang

Student

  • Song Gao (@UAB; PhD 2014; now Software Engineer at Google)
  • Manar Mohamed (@UAB; PhD 2016; now Visiting Assistant Professor at Miami University)

Publication

  • Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures
    Song Gao, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang.
    In IEEE Transactions on Dependable and Secure Computing (TDSC), 2017.
    [pdf]

Recent News

  • Paper accepted to WiSec 2026 January 13, 2026
  • Paper accepted to EACL 2026 January 5, 2026
  • Paper accepted to USENIX Security 2026 December 17, 2025
  • SPIES Lab Research Cited in News Coverage on AI Security Breach December 14, 2025
  • SPIES Lab Research Featured in TAMU College of Engineering Spotlight December 5, 2025
  • Paper accepted to IJCNLP-AACL 2025 October 25, 2025
  • TAMU SPIES Lab Wins CCS 2025 Distinguished Paper Award! October 20, 2025
  • Paper accepted to eCrime 2025 September 9, 2025
  • Paper accepted to IEEE S&P (Magazine) August 24, 2025
  • Another recent SPIES graduate to take up faculty position August 21, 2025
  • Paper accepted to CSCML 2025 August 13, 2025
  • SPIES graduate to start as Assistant Professor July 22, 2025
  • Paper accepted to ACM CCS 2025 July 2, 2025
  • News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users June 30, 2025
  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025

© 2016–2026 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment