{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:36:14Z","timestamp":1742938574957,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030656096"},{"type":"electronic","value":"9783030656102"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65610-2_7","type":"book-chapter","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T09:03:39Z","timestamp":1607159019000},"page":"97-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach"],"prefix":"10.1007","author":[{"given":"Abhijeet","family":"Chougule","sequence":"first","affiliation":[]},{"given":"Harshal","family":"Tupsamudre","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Lodha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"key":"7_CR1","unstructured":"BotDetect Audio CAPTCHA Samples. https:\/\/captcha.com\/audio-captcha-examples.html. Accessed 8 Aug 2020"},{"key":"7_CR2","unstructured":"CM Relief Fund. https:\/\/cmrf.maharashtra.gov.in\/CMRFCitizen\/showdonform.action. Accessed 8 Aug 2020"},{"key":"7_CR3","unstructured":"CM Relief Fund. https:\/\/apcmrf.ap.gov.in. Accessed 8 Aug 2020"},{"key":"7_CR4","unstructured":"CM Relief Fund. www.cmrf.bih.nic.in\/users\/quickdonate.aspx. Accessed 8 Aug 2020"},{"key":"7_CR5","unstructured":"Deep-CAPTCHA. https:\/\/github.com\/DrMahdiRezaei\/Deep-CAPTCHA. Accessed 8 Aug 2020"},{"key":"7_CR6","unstructured":"Login to Allahabad Netbanking. https:\/\/www.allbankonline.in\/jsp\/startnew.jsp. Accessed 8 Aug 2020"},{"key":"7_CR7","unstructured":"Login to Axis. https:\/\/retail.axisbank.co.in. Accessed 8 Aug 2020"},{"key":"7_CR8","unstructured":"Login to Fast tag HDFC. https:\/\/fastag.hdfcbank.com\/RetailRoadUserLogin\/Index. Accessed 8 Aug 2020"},{"key":"7_CR9","unstructured":"Login to IRCTC. https:\/\/www.irctc.co.in\/nget\/train-search. Accessed 8 Aug 2020"},{"key":"7_CR10","unstructured":"Login to Karnataka Bank. https:\/\/moneyclick.karnatakabank.co.in\/BankAwayRetail\/AuthenticationController?FORMSGROUP_ID__=AuthenticationFG&__START_TRAN_FLAG__=Y&__EVENT_ID__=LOAD&ACTION.LOAD=Y&__CALL_MODE__=52&AuthenticationFG.LOGIN_FLAG=1&BANK_ID=KBL. Accessed 8 Aug 2020"},{"key":"7_CR11","unstructured":"Login to MSRTC. https:\/\/public.msrtcors.com\/ticket_booking\/index.php. Accessed 8 Aug 2020"},{"key":"7_CR12","unstructured":"Login to OnlineSBI. https:\/\/retail.onlinesbi.com\/retail\/login.htm. Accessed 8 Aug 2020"},{"key":"7_CR13","unstructured":"Login to Service Plus. https:\/\/serviceonline.gov.in\/. Accessed 8 Aug 2020"},{"key":"7_CR14","unstructured":"Registration on Vistara. https:\/\/www.airvistara.com\/in\/en\/club-vistara\/register. Accessed 8 Aug 2020"},{"key":"7_CR15","unstructured":"SBI Collect Payment. https:\/\/www.onlinesbi.com\/sbicollect\/payment\/showpaymentdetails.htm. Accessed 8 Aug 2020"},{"key":"7_CR16","unstructured":"SimilarWeb. https:\/\/www.similarweb.com\/. Accessed 8 Aug 2020"},{"key":"7_CR17","unstructured":"VAHAN search. https:\/\/vahan.nic.in\/nrservices\/faces\/user\/searchstatus.xhtml. Accessed 8 Aug 2020"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L von Ahn","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56\u201360 (2004). https:\/\/doi.org\/10.1145\/966389.966390","journal-title":"Commun. ACM"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Brodi\u0107, D., Amelio, A.: Captcha programming. In: The CAPTCHA: Perspectives and Challenges, pp. 55\u201376. Springer (2020)","DOI":"10.1007\/978-3-030-29345-1_8"},{"key":"7_CR20","unstructured":"Bursztein, E.: How we broke the nucaptcha video scheme and what we propose to fix it. https:\/\/elie.net\/blog\/security\/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it. Accessed 08 Aug 2020"},{"key":"7_CR21","unstructured":"Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: generic solving of text-based CAPTCHAs. In: 8th USENIX Workshop on Offensive Technologies (WOOT 2014). USENIX Association, San Diego, CA (2014). https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/bursztein"},{"key":"7_CR22","unstructured":"Bursztein, E., Bethard, S.: Decaptcha: breaking 75% of EBay audio CAPTCHAs. In: Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT 2009). p. 8. USENIX Association, USA (2009)"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pp. 125\u2013138. Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/2046707.2046724","DOI":"10.1145\/2046707.2046724"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-981-13-1483-4_4","volume-title":"Advances in Cyber Security: Principles, Techniques, and Applications","author":"Y-W Chow","year":"2019","unstructured":"Chow, Y.-W., Susilo, W., Thorncharoensri, P.: CAPTCHA design and security issues. In: Li, K.-C., Chen, X., Susilo, W. (eds.) Advances in Cyber Security: Principles, Techniques, and Applications, pp. 69\u201392. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-1483-4_4"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1. pp. 886\u2013893 (2005)","DOI":"10.1109\/CVPR.2005.177"},{"key":"7_CR26","unstructured":"Foote, E.M.: More secure image-based \u201cCAPTCHA\u201d technique, US Patent 9,075,983 (2015)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Gao, H., et al.: A simple generic attack on text Captchas. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21\u201324, 2016. The Internet Society (2016). http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/simple-generic-attack-text-captchas.pdf","DOI":"10.14722\/ndss.2016.23154"},{"key":"7_CR28","unstructured":"Google: reCAPTCHA protects your website from fraud and abuse. https:\/\/www.google.com\/recaptcha\/about\/. Accessed 8 August 2020"},{"key":"7_CR29","unstructured":"hCaptcha: Stop more bots. Start protecting user privacy. https:\/\/www.hcaptcha.com\/. Accessed 8 Aug 2020"},{"key":"7_CR30","unstructured":"Institute, M.G.: Digital India: technology to transform a connected nation, https:\/\/www.mckinsey.com\/business-functions\/mckinsey-digital\/our-insights\/digital-india-technology-to-transform-a-connected-nation. Accessed 8 Aug 2020"},{"key":"7_CR31","unstructured":"McConnell, R.K.: Method of and apparatus for pattern recognition (1986)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Nouri, Z., Rezaei, M.: Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment. Available at SSRN 3633354 (2020)","DOI":"10.2139\/ssrn.3633354"},{"key":"7_CR33","unstructured":"NuCaptcha: How Much Is User Abandonment Costing Your Company?. https:\/\/www.nucaptcha.com. Accessed 8 Aug 2020"},{"issue":"11","key":"7_CR34","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1109\/TIFS.2017.2718479","volume":"12","author":"M Osadchy","year":"2017","unstructured":"Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., P\u00e9rez-Cabo, D.: No bot expects the deepcaptcha! introducing immutable adversarial examples, with applications to captcha generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640\u20132653 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR35","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 9(1), 62\u201366 (1979)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"7_CR36","unstructured":"Roberts, E.: Bad Bot Report 2020: Bad Bots Strike Back. https:\/\/www.imperva.com\/blog\/bad-bot-report-2020-bad-bots-strike-back\/. Accessed 8 Aug 2020"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Sivakorn, S., Polakis, I., Keromytis, A.D.: I am Robot: (Deep) learning to break semantic image CAPTCHAs. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp. 388\u2013403 (2016)","DOI":"10.1109\/EuroSP.2016.37"},{"issue":"11","key":"7_CR38","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/3349629","volume":"62","author":"N Verma","year":"2019","unstructured":"Verma, N., Dawar, S.: Digital transformation in the indian government. Commun. ACM 62(11), 50\u201353 (2019). https:\/\/doi.org\/10.1145\/3349629","journal-title":"Commun. ACM"},{"key":"7_CR39","doi-asserted-by":"publisher","unstructured":"Ye, G., et al.: Yet another text Captcha solver: a generative adversarial network based approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 332\u2013348. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3243734.3243754","DOI":"10.1145\/3243734.3243754"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65610-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T16:08:23Z","timestamp":1723997303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65610-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030656096","9783030656102"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65610-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isrdc.iitb.ac.in\/iciss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 3 work-in-progress papers were published.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}