{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:26:35Z","timestamp":1775715995754,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540232087","type":"print"},{"value":"9783540301448","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_23","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T20:34:45Z","timestamp":1284842085000},"page":"268-279","source":"Crossref","is-referenced-by-count":71,"title":["Image Recognition CAPTCHAs"],"prefix":"10.1007","author":[{"given":"Monica","family":"Chew","sequence":"first","affiliation":[]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"1107","volume":"3","author":"K. Barnard","year":"2002","unstructured":"Barnard, K., Duygulu, P., Forsyth, D., de Freitas, N., Blei, D., Jordan, M.: Matching words and pictures. Special Issue on Text and Images, Journal of Machine Learning Research\u00a03, 1107\u20131135 (2002)","journal-title":"Special Issue on Text and Images, Journal of Machine Learning Research"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Barnard, K., Forsyth, D.: Learning the semantics of words and pictures. In: International Conference on Computer Vision, vol.\u00a02, pp. 408\u2013415 (2001)","DOI":"10.1109\/ICCV.2001.937654"},{"key":"23_CR3","unstructured":"Blum, M., von Ahn, L.A., Langford, J., Hopper, N.: The CAPTCHA Project (November 2000), http:\/\/www.captcha.net"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Chew, M., Baird, H.: Baffletext: A human interactive proof. In: Document Recognition and Retrieval X (2003)","DOI":"10.1117\/12.479682"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Chew, M., Tygar, J.D.: Image recognition captchas. Technical Report UCB\/\/CSD-04-1333, UC Berkeley (2004)","DOI":"10.1007\/978-3-540-30144-8_23"},{"issue":"2","key":"23_CR6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.28945\/578","volume":"3","author":"A. Goodrum","year":"2000","unstructured":"Goodrum, A.: Image information retrieval: An overview of current research. Informing Science\u00a03(2), 63\u201366 (2000)","journal-title":"Informing Science"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"23_CR8","unstructured":"Kehoe, C., Pitkow, J., Sutton, K., Aggarwal, G., Rogers, J.D.: Gvu\u2019s 10th world wide web user survey (1999), http:\/\/www.gvu.gatech.edu\/usersurveys\/survey-1998-10\/"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/860435.860452","volume-title":"Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval","author":"S. McDonald","year":"2003","unstructured":"McDonald, S., Tait, J.: Search strategies in content-based image retrieval. In: Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, pp. 80\u201387. ACM Press, New York (2003)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45074-2","volume-title":"Energy Minimization Methods in Computer Vision and Pattern Recognition","author":"G. Mori","year":"2003","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Rangarajan, A., Figueiredo, M.A.T., Zerubia, J. (eds.) EMMCVPR 2003. LNCS, vol.\u00a02683, Springer, Heidelberg (2003)"},{"key":"23_CR11","unstructured":"Oliver, J.J.: Decision graphs - an extension of decision trees. In: Proceedings of the Fourth International Workshop on Artificial Intelligence and Statistics, pp. 343\u2013350 (1993)"},{"key":"23_CR12","unstructured":"Pdictionary.: The internet picture dictionary (2004), http:\/\/www.pdictionary.com"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Turing, A.: Computing machinery and intelligence. Mind ,433\u2013460 (1950)","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:44:56Z","timestamp":1605743096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}