{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:42:16Z","timestamp":1743057736915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184661"},{"type":"electronic","value":"9783319184678"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_24","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T08:12:03Z","timestamp":1431072723000},"page":"354-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing the Security of Image CAPTCHAs Through Noise Addition"],"prefix":"10.1007","author":[{"given":"David","family":"Lorenzi","sequence":"first","affiliation":[]},{"given":"Emre","family":"Uzun","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Blocki, J., Blum, M., Datta, A.: Gotcha password hackers!. In: AISec 2013, pp. 25\u201334 (2013)","DOI":"10.1145\/2517312.2517319"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-30144-8_23","volume-title":"Information Security","author":"M Chew","year":"2004","unstructured":"Chew, M., Tygar, J.D.: Image recognition captchas. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 268\u2013279. Springer, Heidelberg (2004)"},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"5:1","DOI":"10.1145\/1348246.1348248","volume":"40","author":"R Datta","year":"2008","unstructured":"Datta, R., Joshi, D., Li, J., Wang, J.Z.: Image Retrieval: Ideas, Influences, and Trends of the New Age. ACM Comput. Surv. 40(2), 5:1\u20135:60 (2008)","journal-title":"ACM Comput. Surv."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Datta, R., Li, J., Wang, J.Z.: Imagination: a robust image-based captcha generation system. In: MULTIMEDIA 2005, pp. 331\u2013334 (2005)","DOI":"10.1145\/1101149.1101218"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"El Ahmad, A.S., Yan, J., Marshall, L.: The robustness of a new captcha. In: EUROSEC 2010, pp. 36\u201341 (2010)","DOI":"10.1145\/1752046.1752052"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-15152-1_2","volume-title":"Trust, Privacy and Security in Digital Business","author":"C Fritsch","year":"2010","unstructured":"Fritsch, C., Netter, M., Reisser, A., Pernul, G.: Attacking image recognition captchas. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 13\u201325. Springer, Heidelberg (2010)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Gossweiler, R., Kamvar, M., Baluja, S.: What\u2019s up captcha?: a captcha based on image orientation. In: WWW 2009, pp. 841\u2013850 (2009)","DOI":"10.1145\/1526709.1526822"},{"key":"24_CR8","unstructured":"Hernandez-Castro, C.J., Ribagorda, A., Saez, Y.: Side-channel attack on the humanauth captcha. In: SECRYPT 2010, pp. 1\u20137 (2010)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Jian, M.-F., Chu, H.-K., Lee, R.-R., Ku, C.-L., Wang, Y.-S., Yao, C.-Y.: Emerging images synthesis from photographs. In: ACM SIGGRAPH 2013, pp. 97:1\u201397:1 (2013)","DOI":"10.1145\/2503385.2503492"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-45204-8_16","volume-title":"Information Systems Security","author":"D Lorenzi","year":"2013","unstructured":"Lorenzi, D., Vaidya, J., Sural, S., Atluri, V.: Web services based attacks against image captchas. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 214\u2013229. Springer, Heidelberg (2013)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-35130-3_23","volume-title":"Information Systems Security","author":"D Lorenzi","year":"2012","unstructured":"Lorenzi, D., Vaidya, J., Uzun, E., Sural, S., Atluri, V.: Attacking image based captchas using image recognition techniques. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 327\u2013342. Springer, Heidelberg (2012)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Lowe, D.G.: Object recognition from local scale-invariant features. In: ICCV 1999, pp. 1150\u20131157 (1999)","DOI":"10.1109\/ICCV.1999.790410"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Matthews, P., Mantel, A., Zou, C.C.: Scene tagging: image-based captcha using image composition and object relationships. In: ASIACCS 2010, pp. 345\u2013350 (2010)","DOI":"10.1145\/1755688.1755736"},{"key":"24_CR14","unstructured":"Mehrnejad, M., Bafghi, A., Harati, A., Toreini, E.: Multiple seimcha: multiple semantic image captcha. In: ICITST 2011, pp. 196\u2013201 (2011)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Mitra, N.J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H., Cohen-Or, D.: Emerging images. In: ACM SIGGRAPH Asia 2009, pp. 163:1\u2013163:8 (2009)","DOI":"10.1145\/1661412.1618509"},{"issue":"2","key":"24_CR16","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1137\/080732730","volume":"2","author":"J-M Morel","year":"2009","unstructured":"Morel, J.-M., Yu, G.: Asift: A New Framework for Fully Affine Invariant Image Comparison. SIAM J. Img. Sci. 2(2), 438\u2013469 (2009)","journal-title":"SIAM J. Img. Sci."},{"issue":"2","key":"24_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. Commun. ACM 47(2), 56\u201360 (2004)","journal-title":"Commun. ACM"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: SOUPS 2008, pp. 44\u201352 (2008)","DOI":"10.1145\/1408664.1408671"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K.: Attacks and design of image recognition captchas. In: CCS 2010, pp. 187\u2013200 (2010)","DOI":"10.1145\/1866307.1866329"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:24:23Z","timestamp":1559161463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_24","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}