{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:42:50Z","timestamp":1763664170183},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030341510"},{"type":"electronic","value":"9783030341527"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34152-7_17","type":"book-chapter","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:43:16Z","timestamp":1580740996000},"page":"218-233","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["FP-Captcha: An Improved Captcha Design Scheme Based on Face Points"],"prefix":"10.1007","author":[{"given":"Palash","family":"Ray","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Giri","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Priya","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,1]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Chew, M., Tygar, J.D.: Image recognition Captchas. In: International Conference on Information Security, pp. 268\u2013279. Springer (2004)","DOI":"10.1007\/978-3-540-30144-8_23"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Datta, R., Li, J., Wang, J.Z.: IMAGINATION: a robust image-based Captcha generation system. In: Proceedings of the 13th Annual ACM International Conference on Multimedia, pp. 331\u2013334. ACM (2005)","DOI":"10.1145\/1101149.1101218"},{"key":"17_CR3","unstructured":"Elson, J., Douceur, J.J., Howell, J., Saul, J.: Asirra: a Captcha that exploits interest-aligned manual image categorization (2007)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Gao, H., Lei, L., Zhou, X., Li, J., Liu, X.: The robustness of face-based Captchas. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 2248\u20132255. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.332"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Gao, H., Yao, D., Liu, H., Liu, X., Wang, L.: A novel image based Captcha using jigsaw puzzle. In: 2010 IEEE 13th International Conference on Computational Science and Engineering (CSE), pp. 351\u2013356. IEEE (2010)","DOI":"10.1109\/CSE.2010.53"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.future.2012.08.013","volume":"31","author":"G Goswami","year":"2014","unstructured":"Goswami, G., Powell, B.M., Vatsa, M., Singh, R., Noore, A.: FaceDCAPTCHA: face detection based color image Captcha. Future Gener. Comput. Syst. 31, 59\u201368 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"e91708","DOI":"10.1371\/journal.pone.0091708","volume":"9","author":"G Goswami","year":"2014","unstructured":"Goswami, G., Powell, B.M., Vatsa, M., Singh, R., Noore, A.: FR-CAPTCHA: Captcha based on recognizing human faces. PloS One 9(4), e91708 (2014)","journal-title":"PloS One"},{"issue":"13","key":"17_CR8","doi-asserted-by":"publisher","first-page":"4583","DOI":"10.1007\/s11042-013-1823-z","volume":"74","author":"Q Li","year":"2015","unstructured":"Li, Q.: A computer vision attack on the artifacial Captcha. Multimedia Tools Appl. 74(13), 4583\u20134597 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Nejati, H., Cheung, N.M., Sosa, R., Koh, D.C.: DeepCaptcha: an image Captcha based on depth perception. In: Proceedings of the 5th ACM Multimedia Systems Conference, pp. 81\u201390. ACM (2014)","DOI":"10.1145\/2557642.2557653"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/ACCESS.2014.2321001","volume":"2","author":"BM Powell","year":"2014","unstructured":"Powell, B.M., Goswami, G., Vatsa, M., Singh, R., Noore, A.: fgCaptcha: genetically optimized face image Captcha 5. IEEE Access 2, 473\u2013484 (2014)","journal-title":"IEEE Access"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Powell, B.M., Kalsy, E., Goswami, G., Vatsa, M., Singh, R., Noore, A.: Attack-resistant aiCaptcha using a negative selection artificial immune system. In: 2017 IEEE Security and Privacy Workshops (SPW), pp. 41\u201346. IEEE (2017)","DOI":"10.1109\/SPW.2017.22"},{"issue":"6","key":"17_CR12","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s00530-003-0122-3","volume":"9","author":"Y Rui","year":"2004","unstructured":"Rui, Y., Liu, Z.: ARTiFACIAL: automated reverse turing test using facial features. Multimedia Syst. 9(6), 493\u2013502 (2004)","journal-title":"Multimedia Syst."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Vikram, S., Fan, Y., Gu, G.: SEMAGE: a new image-based two-factor Captcha. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 237\u2013246. ACM (2011)","DOI":"10.1145\/2076732.2076766"},{"key":"17_CR14","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2001, CVPR 2001, vol. 1, p. I. IEEE (2001)"},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137\u2013154 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard AI problems for security. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294\u2013311. Springer (2003)","DOI":"10.1007\/3-540-39200-9_18"},{"issue":"2","key":"17_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L Ahn Von","year":"2004","unstructured":"Von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56\u201360 (2004)","journal-title":"Commun. ACM"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, P., Gao, H., Cheng, Z., Cao, F.: Two novel image-based Captcha schemes based on visual effects. In: CCF Chinese Conference on Computer Vision, pp. 14\u201325. Springer (2017)","DOI":"10.1007\/978-981-10-7305-2_2"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K.: Attacks and design of image recognition Captchas. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 187\u2013200. ACM (2010)","DOI":"10.1145\/1866307.1866329"}],"container-title":["Studies in Computational Intelligence","Recent Advances in Intelligent Information Systems and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34152-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:52:59Z","timestamp":1580741579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34152-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030341510","9783030341527"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34152-7_17","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology and Applied Mathematics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haldia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icitam2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hithaldia.co.in\/icitam2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}