{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:53:23Z","timestamp":1743008003678,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319400921"},{"type":"electronic","value":"9783319400938"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40093-8_14","type":"book-chapter","created":{"date-parts":[[2016,6,18]],"date-time":"2016-06-18T02:46:18Z","timestamp":1466217978000},"page":"130-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Usability Comparison of Text CAPTCHAs Based on English and Chinese"],"prefix":"10.1007","author":[{"given":"Junnan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xuna","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,19]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"L von Ahn","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) Advances in Cryptology \u2014 EUROCRYPT 2003, vol. 2656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L Von Ahn","year":"2004","unstructured":"Von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47, 56\u201360 (2004)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 44\u201352. ACM, Pittsburgh (2008)","key":"14_CR3","DOI":"10.1145\/1408664.1408671"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-16732-4_46","volume-title":"Computational Collective Intelligence","author":"AB Jeng","year":"2010","unstructured":"Jeng, A.B., Tseng, C.-C., Tseng, D.-F., Wang, J.-C.: A study of CAPTCHA and its application to user authentication. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS, vol. 6422, pp. 433\u2013440. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 125\u2013138. ACM (2011)","key":"14_CR5","DOI":"10.1145\/2046707.2046724"},{"issue":"12","key":"14_CR6","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1002\/sec.1157","volume":"8","author":"M Moradi","year":"2014","unstructured":"Moradi, M., Keyvanpour, M.: CAPTCHA and its Alternatives: A Review. Secur. Commun. Netw. 8(12), 2135\u20132156 (2014)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (HIPs). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 711\u2013720. ACM (2005)","key":"14_CR7","DOI":"10.1145\/1054972.1055070"},{"doi-asserted-by":"crossref","unstructured":"Bursztein, E., Moscicki, A., Fabry, C., Bethard, S., Mitchell, J.C., Jurafsky, D.: Easy does it: more usable captchas. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2637\u20132646. ACM (2014)","key":"14_CR8","DOI":"10.1145\/2556288.2557322"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.displa.2010.12.004","volume":"32","author":"Y-L Lee","year":"2011","unstructured":"Lee, Y.-L., Hsu, C.-H.: Usability study of text-based CAPTCHAs. Displays 32, 81\u201386 (2011)","journal-title":"Displays"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijhcs.2015.07.002","volume":"84","author":"M Belk","year":"2015","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Do human cognitive differences in information processing affect preference and performance of CAPTCHA? Int. J. Hum Comput Stud. 84, 1\u201318 (2015)","journal-title":"Int. J. Hum Comput Stud."},{"key":"14_CR11","first-page":"1783","volume":"12","author":"MH Shirali-Shahreza","year":"2006","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Persian\/Arabic baffletext CAPTCHA. J. UCS 12, 1783\u20131796 (2006)","journal-title":"J. UCS"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.5392\/IJoC.2009.5.3.050","volume":"5","author":"T-C Yang","year":"2009","unstructured":"Yang, T.-C., Ince, I.F., Salman, Y.B.: A korean CAPTCHA study: defeating OCRs in a new CAPTCHA context by using korean syllables. Int. J. Contents 5, 50\u201356 (2009)","journal-title":"Int. J. Contents"},{"doi-asserted-by":"crossref","unstructured":"Banday, M.T., Shah, N.A.: Challenges of CAPTCHA in the accessibility of Indian regional websites. In: Proceedings of the Fourth Annual ACM Bangalore Conference, pp. 1\u20134. ACM, Bangalore (2011)","key":"14_CR13","DOI":"10.1145\/1980422.1980453"},{"key":"14_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-662-43908-1_27","volume-title":"Trustworthy Computing and Services","author":"T Wang","year":"2014","unstructured":"Wang, T., B\u00f8egh, J.: Multi-layer CAPTCHA based on Chinese character deformation. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2013. CCIS, vol. 426, pp. 205\u2013211. Springer, Heidelberg (2014)"},{"doi-asserted-by":"crossref","unstructured":"Shen, Y., Ji, R., Cao, D., Wang, M.: Hacking Chinese touclick CAPTCHA by multi-scale corner structure model with fast pattern matching. In: MM 2014 \u2013 Proceedings of the 2014 ACM Conference on Multimedia, pp. 853\u2013856 (2014)","key":"14_CR15","DOI":"10.1145\/2647868.2655017"},{"key":"14_CR16","first-page":"53","volume":"8","author":"D Chen","year":"2009","unstructured":"Chen, D.: Research of the Chinese CAPTCHA system based on AJAX. WSEAS Trans. Circ. Syst. 8, 53\u201362 (2009)","journal-title":"WSEAS Trans. Circ. Syst."},{"key":"14_CR17","first-page":"023","volume":"6","author":"J Hai-kun","year":"2006","unstructured":"Hai-kun, J., Wen-jie, D., Li-min, S.: Research on security model with Chinese CAPTCHA. Comput. Eng. Des. 6, 023 (2006)","journal-title":"Comput. Eng. Des."},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MIS.2005.41","volume":"20","author":"S Xu","year":"2005","unstructured":"Xu, S., Lau, F., Cheung, W.K., Pan, Y.: Automatic generation of artistic Chinese calligraphy. Intell. Syst. IEEE 20, 32\u201339 (2005)","journal-title":"Intell. Syst. IEEE"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-45756-9_16","volume-title":"Human Computer Interaction with Mobile Devices","author":"I MacKenzie","year":"2002","unstructured":"MacKenzie, I.: KSPC (Keystrokes per Character) as a characteristic of text entry techniques. In: Patern\u00f3, F. (ed.) Mobile HCI 2002. LNCS, vol. 2411, p. 195. Springer, Heidelberg (2002)"},{"unstructured":"Securimage. \n                      https:\/\/www.phpcaptcha.org\/","key":"14_CR20"},{"unstructured":"Standard, I.: Ergonomic requirements for office work with visual display terminals (vdts)\u2013part 11: guidance on usability. ISO standard 9241-11: 1998. International Organization for Standardization (1998)","key":"14_CR21"}],"container-title":["Lecture Notes in Computer Science","Cross-Cultural Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40093-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:39:52Z","timestamp":1594341592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40093-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319400921","9783319400938"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40093-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}