{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T20:43:43Z","timestamp":1763585023715},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440680"},{"type":"electronic","value":"9783540458692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45869-7_54","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T00:43:00Z","timestamp":1193272980000},"page":"507-518","source":"Crossref","is-referenced-by-count":37,"title":["Human Interactive Proofs and Document Image Analysis"],"prefix":"10.1007","author":[{"given":"Henry S.","family":"Baird","sequence":"first","affiliation":[]},{"given":"Kris","family":"Popat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,9]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/978-3-642-77281-8_26","volume-title":"Structured Document Image Analysis","author":"H. S. Baird","year":"1992","unstructured":"H. S. Baird, \u201cDocument Image Defect Models,\u201d in H. S. Baird, H. Bunke, and K. Yamamoto Eds., Structured Document Image Analysis, Springer-Verlag: New York, 1992, pp. 546\u2013556."},{"key":"54_CR2","unstructured":"M. Blum, L. A. von Ahn, and J. Langford, The CAPTCHA Project, \u201cCompletely Automatic Public Turing Test to tell Computers and Humans Apart,\u201d \n                    http:\/\/www.captcha.net\n                    \n                  , Dept. of Computer Science, Carnegie-Mellon Univ., and personal communications, November, 2000."},{"key":"54_CR3","unstructured":"D. P. Baron, \u201ceBay and Database Protection,\u201d Case No. P-33, Case Writing Office, Stanford Graduate School of Business, 518 Memorial Way, Stanford Univ., Stanford, CA 94305-5015, 2001."},{"key":"54_CR4","unstructured":"Alta Vista\u2019s \u201cAdd-URL\u201d site: altavista.com\/sites\/addurl\/newurl, protected by the earliest known CAPTCHA."},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"A. L. Coates, H. S. Baird, R. Fateman, \u201cPessimal Print: a Reverse Turing Test,\u201d Proc., IAPR 6th Intl. Conf. on Document Analysis and Recognition, Seattle, WA, September 10\u201313, 2001, pp. 1154\u20131158.","DOI":"10.1109\/ICDAR.2001.953966"},{"key":"54_CR6","unstructured":"R. G. Crowder, The Psychology of Reading, Oxford University Press, 1982."},{"issue":"2","key":"54_CR7","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1009954710479","volume":"2","author":"L. D","year":"2000","unstructured":"D. Lopresti and J. Zhou, \u201cLocating and Recognizing Text in WWW Images,\u201d Information Retrieval, May, 2000, Vol. 2, No. 2\/3, pp. 177\u2013206.","journal-title":"Information Retrieval"},{"key":"54_CR8","unstructured":"L. M. Gentile, M. L. Kamil, J. S. Blanchard \u2018Reading Research Revisited\u2019 Charles E. Merrill Publishing, 1983."},{"issue":"10","key":"54_CR9","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1109\/34.625107","volume":"19","author":"T. K. Ho","year":"1997","unstructured":"T. K. Ho and H. S. Baird, \u201cLarge-Scale Simulation Studies in Image Pattern Recognition,\u201d IEEE Trans. on PAMI, Vol. 19, No. 10, pp. 1067\u20131079, October 1997.","journal-title":"IEEE Trans. on PAMI"},{"key":"54_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Secure Human Identi.cation Protocols","author":"N. J. Hopper","year":"2001","unstructured":"N. J. Hopper and M. Blum, \u201cSecure Human Identi.cation Protocols,\u201d In: C. Boyd Ed. Advances in Crypotology, Proceedings of Asiacrypt 2001, LNCS 2248, pp.52\u201366, Springer-Verlag Berlin, 2001"},{"key":"54_CR11","unstructured":"T. Kanungo, Document Degradation Models and Methodology for Degradation Model Validation, Ph.D. Dissertation, Dept. EE, Univ. Washington, March 1996."},{"key":"54_CR12","unstructured":"T. Kanungo, C. H. Lee and R. Bradford,\u201cWhat Fraction of Images on the Web Contain Text?\u201d, Proc. of Int. Workshop on Web Document Analysis, Seattle, WA, Sept. 8, 2001, web publication only, at \n                    http:\/\/www.csc.liv.ac.uk\/~wda2001\n                    \n                  ."},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"P. A. Kolers, M. E. Wrolstad, H. Bouma, Processing of Visible Language 2, Plenum Press, 1980.","DOI":"10.1007\/978-1-4684-1068-6"},{"key":"54_CR14","unstructured":"M. D. Lillibridge, M. Abadi, K. Bharat, A. Z. Broder, \u201cMethod for Selectively Restricting Access to Computer Systems,\u201d U.S. Patent No. 6,195,698, Issued February 27, 2001."},{"issue":"3","key":"54_CR15","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1037\/0033-295X.104.3.524","volume":"104","author":"G. E. Legge","year":"1997","unstructured":"G. E. Legge, T. S. Klitz, and B. S. Tjan. \u201cMr. chips: An ideal-observer model of reading,\u201d Psychological Review 104(3):524\u2013553, 1997.","journal-title":"Psychological Review"},{"issue":"2","key":"54_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/0042-6989(85)90117-8","volume":"25","author":"G. E. Legge","year":"1985","unstructured":"G. E. Legge, D. G. Pelli, G. S. Rubin, and M. M. Schleske, \u201cPsychophysics of reading: I. normal vision,\u201d Vision Research, 25(2):239\u2013252, 1985.","journal-title":"Vision Research"},{"key":"54_CR17","first-page":"473","volume":"11","author":"G. Nagy","year":"1996","unstructured":"G. Nagy and S. Seth, \u201cModern optical character recognition.\u201d in The Froehlich \/ Kent Encyclopaedia of Telecommunications, Vol. 11, pp. 473\u2013531, Marcel Dekker, NY, 1996.","journal-title":"The Froehlich \/ Kent Encyclopaedia of Telecommunications"},{"key":"54_CR18","unstructured":"T. Pavlidis, \u201cThirty Years at the Pattern Recognition Front,\u201d King-Sun Fu Prize Lecture, 11th ICPR, Barcelona, September, 2000."},{"key":"54_CR19","unstructured":"D. G. Pelli, C. W. Burns, B. Farell, and D. C. Moore, \u201cIdentifying letters,\u201d Vision Research, [accepted with minor revisions; to appear], 2002."},{"key":"54_CR20","unstructured":"S. V. Rice, G. Nagy, and T. A. Nartker, OCR: An Illustrated Guide to the Frontier, Kluwer Academic Publishers, 1999."},{"key":"54_CR21","unstructured":"S. V. Rice, F. R. Jenkins, and T. A. Nartker, \u201cThe Fifth Annual Test of OCR Accuracy,\u201d ISRI TR-96-01, Univ. of Nevada, Las Vegas, 1996."},{"key":"54_CR22","unstructured":"A. P. Saygin, I. Cicekli, and V. Akman, \u201cTuring Test: 50 Years Later,\u201d Minds and Machines, 10(4), Kluwer, 2000."},{"issue":"236","key":"54_CR23","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"A. Turing","year":"1950","unstructured":"A. Turing, \u201cComputing Machinery and Intelligence,\u201d Mind, Vol. 59(236), pp. 433\u2013460, 1950.","journal-title":"Mind"}],"container-title":["Lecture Notes in Computer Science","Document Analysis Systems V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45869-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T13:38:27Z","timestamp":1551015507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45869-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440680","9783540458692"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45869-7_54","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}