{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T05:20:44Z","timestamp":1739942444416,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_15","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"273-291","source":"Crossref","is-referenced-by-count":12,"title":["Anti-bot Strategies Based on Human Interactive Proofs"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Basso","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francesco","family":"Bergadano","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"3\/4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.cose.2008.11.002","volume":"28","author":"A. Basso","year":"2009","unstructured":"A.\u00a0Basso, S.\u00a0Sicco: Preventing massive automated access to web resources, Comput. Secur. 28(3\/4), 174\u2013188 (2009), doi:10.1016\/j.cose.2008.11.002","journal-title":"Comput. Secur."},{"issue":"4","key":"15_CR2","first-page":"2","volume":"9","author":"M. Koster","year":"1995","unstructured":"M.\u00a0Koster: Robots in the web: threat or treat?, ConneXions 9(4), 2\u201312 (1995)","journal-title":"ConneXions"},{"key":"15_CR3","unstructured":"A.\u00a0Basso: Protecting web resources from massive automated access, Technical report RT-114\/08, Computer Science Departement, University of Torino (2008), http:\/\/www.di.unito.it\/basso\/papers\/captcha-RT114-08.pdf"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"A.\u00a0Basso, F.\u00a0Bergadano, I.\u00a0Coradazzi, P.D.\u00a0Checco: Lightweight security for internet polls, EGCDMAS (INSTICC Press, 2004) pp. 46\u201355","DOI":"10.5220\/0001402600460055"},{"key":"15_CR5","unstructured":"M. Blum, H. S. Baird: First workshop on human interactive proofs, Xerox Palo Alto Research Center, CA (2002) http:\/\/www2.parc.com\/istl\/groups\/did\/HIP2002\/"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","first-page":"56","volume-title":"ASIACRYPT","author":"N.J. Hopper","year":"2001","unstructured":"N.J.\u00a0Hopper, M.\u00a0Blum: Secure human identification protocols. In: ASIACRYPT, Lecture Notes in Computer Science, Vol. 224, ed. by C.\u00a0Boyd (Springer, London 2001) pp. 56\u201366"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"H.S.\u00a0Baird, K.\u00a0Popat: Human interactive proofs and document image analisys, IAPR 2002: Workshop on document analisys system, Princeton (2002)","DOI":"10.1007\/3-540-45869-7_54"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"M.\u00a0Chew, H.S.\u00a0Baird: Baffletext: a Human Interactive Proof, Proc. SPIE\/IS&T Document Recognition and Retrieval X Conference, Vol. 4670, SPIE, Santa Clara (2003)","DOI":"10.1117\/12.479682"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"EUROCRYPT","author":"L. Ahn von","year":"2003","unstructured":"L.\u00a0von\u00a0Ahn, M.\u00a0Blum, N.J.\u00a0Hopper, J.\u00a0Langford: CAPTCHA: Using hard AI problems for security. In: EUROCRYPT, Lecture Notes in Computer Science, Vol. 2656, ed. by E.\u00a0Biham (Springer, Berlin 2003) pp. 294\u2013311"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"L. von Ahn, M.\u00a0Blum, J.\u00a0Langford: Telling humans and computers apart automatically, Commun. ACM 47(2), 56\u201360 (2004)","journal-title":"Commun. ACM"},{"issue":"236","key":"15_CR11","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"A.M. Turing","year":"1950","unstructured":"A.M.\u00a0Turing: Computing machinery and intelligence, Mind 59(236), 433\u2013460 (1950)","journal-title":"Mind"},{"key":"15_CR12","unstructured":"M. Naor: Verification of a human in the loop or identification via the turing test. unpublished notes (September 13, 1996), http:\/\/www.wisdom.weizmann.ac.il\/ naor\/PAPERS\/human.pdf"},{"key":"15_CR13","unstructured":"R.V.\u00a0Hall: CAPTCHA as a web security control, available at http:\/\/www.richhall.com\/captcha\/captcha_20051217.htm (last accessed 14 October 2009)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"M.\u00a0Chew, J.D.\u00a0Tygar: Image recognition CAPTCHAs, Proc. 7th Int. Information Security Conference (ISC 2004) (Springer, 2004) pp. 268\u2013279","DOI":"10.1007\/978-3-540-30144-8_23"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"A.\u00a0Coates, H.\u00a0Baird, R.\u00a0Fateman: Pessimal print: A reverse turing test, Proc. 6th Intl. Conf. on Document Analysis and Recognition (Seattle, 2001) pp. 1154\u20131158","DOI":"10.1109\/ICDAR.2001.953966"},{"key":"15_CR16","unstructured":"G.\u00a0Mori, J.\u00a0Malik: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA, Proc. Conf. Computer Vision and Pattern Recognition, Madison (2003)"},{"key":"15_CR17","unstructured":"reCAPTCHA: Stop Spam, Read Books: Dept. of Computer Science, Carnegie Mellon University, http:\/\/www.recaptcha.net\/ (last accessed 14 October 2009)"},{"issue":"5895","key":"15_CR18","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"L.\u00a0von Ahn, B.\u00a0Maurer, C.\u00a0Mcmillen, D.\u00a0Abraham, M.\u00a0Blum: reCAPTCHA: Human-based character recognition via web security measures, Science 321(5895), 1465\u20131468 (2008), doi:10.1126\/science.1160379","journal-title":"Science"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"H.S.\u00a0Baird, M.A.\u00a0Moll, S.Y.\u00a0Wang: Scattertype: A legible but hard-to-segment CAPTCHA, ICDAR \u201905: Proc. 8th Int. Conference on Document Analysis and Recognition (IEEE Computer Society, Washington 2005) pp. 935\u2013939, doi:10.1109\/ICDAR.2005.205","DOI":"10.1109\/ICDAR.2005.205"},{"key":"15_CR20","volume-title":"Data Complexity in Pattern Recognition","author":"H.S. Baird","year":"2006","unstructured":"H.S.\u00a0Baird: Complex image recognition and web security. In: Data Complexity in Pattern Recognition, ed. by M.\u00a0Basu, T.\u00a0Kam (Springer, London 2006)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"J.\u00a0Yan, A.S.E.\u00a0Ahmad: Breaking visual CAPTCHAs with naive pattern recognition algorithms, Annual Computer Security Applications Conference, Vol. 10(14) (2007) pp. 279\u2013291, doi:10.1109\/ACSAC.2007.47","DOI":"10.1109\/ACSAC.2007.47"},{"key":"15_CR22","unstructured":"PWNtcha CAPTCHA Decoder: http:\/\/sam.zoy.org\/pwntcha\/ (last accessed 14 October 2009)"},{"key":"15_CR23","unstructured":"aiCaptcha: Using AI to beat CAPTCHA and post comment spam: http:\/\/www.brains-n-brawn.com\/aiCaptcha (last accessed 14 October 2009)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"J.\u00a0Yan, A.S.E.\u00a0Ahmad: A low-cost attack on a microsoft CAPTCHA, CCS \u201908: Proc. 15th ACM conference on Computer and communications security, New York (2008) pp. 543\u2013554, doi:10.1145\/1455770.1455839","DOI":"10.1145\/1455770.1455839"},{"key":"15_CR25","unstructured":"Microsoft Live Hotmail under attack by streamlined anti-CAPTCHA and mass-mailing operations, Websense Security Labs, http:\/\/securitylabs.websense.com\/content\/Blogs\/3063.aspx (last accessed 14 October 2009)"},{"key":"15_CR26","unstructured":"Googles CAPTCHA busted in recent spammer tactics, Websense Securitylabs: http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx (last ac cessed 14 October 2009)"},{"key":"15_CR27","unstructured":"Yahoo! CAPTCHA is broken, Network Security Research and AI: http:\/\/network-security-research.blogspot.com\/2008\/01\/yahoo-captcha-is- broken.html (last accessed 14 October 2009)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"K.\u00a0Chellapilla, P.\u00a0Simard, M.\u00a0Czerwinski: Computers beat humans at single character recognition in reading-based human interaction proofs (hips), Proc. 2nd Conference on Email and Anti-Spam (CEAS), Palo Alto (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"15_CR29","first-page":"265","volume-title":"Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)","author":"K. Chellapilla","year":"2005","unstructured":"K.\u00a0Chellapilla, P.Y.\u00a0Simard: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs) (MIT Press, Cambridge 2005) pp. 265\u2013272"},{"key":"15_CR30","unstructured":"G.\u00a0Moy, N.\u00a0Jones, C.\u00a0Harkless, R.\u00a0Potter: Distortion estimation techniques in solving visual CAPTCHAs, Proc. CVPR, Vol.\u00a02 (2004) pp. 23\u201328"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"HIP","author":"K. Chellapilla","year":"2005","unstructured":"K.\u00a0Chellapilla, K.\u00a0Larson, P.Y.\u00a0Simard, M.\u00a0Czerwinski: Building segmentation based human-friendly human interaction proofs (hips). In: HIP, Lecture Notes in Computer Science, Vol. 3517, ed. by H.S.\u00a0Baird, D.P.\u00a0Lopresti (Springer, Berlin 2005) pp. 1\u201326, doi:10.1007\/11427896_1"},{"key":"15_CR32","unstructured":"S. Bohr, A. Shome, J. Z. Simon: Improving auditory CAPTCHA security, TR 2008-32, ISR \u2013 Institute for Systems Research (2008), http:\/\/hdl.handle.net\/1903\/8666"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"G.\u00a0Kochanski, D.\u00a0Lopresti, C.\u00a0Shih: A reverse turing test using speech, Proc. Int. Conferences on Spoken Language Processing (Denver, 2002) pp. 1357\u20131360","DOI":"10.21437\/ICSLP.2002-412"},{"key":"15_CR34","unstructured":"J.\u00a0Tam, J.\u00a0Simsa, D.\u00a0Huggins-Daines, L.\u00a0von Ahn, M.\u00a0Blum: Improving audio CAPTCHAs, Proc. 4th Symposium on Usability, Privacy and Security (SOUPS \u201908), Pittsburgh (2008)"},{"key":"15_CR35","unstructured":"C.\u00a0Nancy: Sound oriented captcha, Proc. 1st Workshop on Human Interactive Proofs, Xerox Palo Alto Research Center (2002)"},{"key":"15_CR36","unstructured":"T.Y.\u00a0Chan: Using a text-to-speech synthesizer to generate a reverse turing test, ICTAI \u201903: Proc. 15th IEEE Int. Conference on Tools with Artificial Intelligence (IEEE Computer Society, Washington 2003) p. 226"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"J.\u00a0Holman, J.\u00a0Lazar, J.H.\u00a0Feng, J.\u00a0D\u2019Arcy: Developing usable CAPTCHAs for blind users, Assets \u201907: Proc. 9th Int. ACM SIGACCESS conference on Computers and accessibility, ACM, New York (2007) pp. 245\u2013246, doi:10.1145\/1296843.1296894","DOI":"10.1145\/1296843.1296894"},{"key":"15_CR38","unstructured":"A. Schlaikjer: A dual-use speech CAPTCHA: Aiding visually impaired web users while providing transcriptions of audio streams. Technical report cmu-lti-07-014, Carnegie Mellon University (2007), http:\/\/www.cs.cmu.edu\/ hazen\/publications\/CMU-LTI-07-014.pdf"},{"key":"15_CR39","unstructured":"Breaking Gmail\u2019s Audio CAPTCHA, Wintercore Labs, B.: http:\/\/blog.wintercore.com\/?p=11 (last accessed 14 October 2009)"},{"key":"15_CR40","unstructured":"J.\u00a0Tam, J.\u00a0Simsa, S.\u00a0Hyde, L.\u00a0von Ahn: Breaking audio CAPTCHAs with machine learning techniques, Neural Information Processing Systems, NIPS 2008, Vancouver (2008)"},{"key":"15_CR41","unstructured":"M. Minsky: Mind as society. Thinking Allowed: Conversations on the Leading Edge of Knowledge and Discovery with Dr. Jeffrey Mishlove (1998), http:\/\/www.intuition.org\/txt\/minsky.htm (last accessed 14 October 2009)"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"J.\u00a0Elson, J.R.\u00a0Douceur, J.\u00a0Howell, J.\u00a0Saul: Asirra: a\u00a0CAPTCHA that exploits interest-aligned manual image categorization, CCS \u201907: Proc. 14th ACM conference on Computer and communications security, ACM, New York (2007) pp. 366\u2013374, doi:10.1145\/1315245.1315291","DOI":"10.1145\/1315245.1315291"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"P.\u00a0Golle: Machine learning attacks against the Asirra CAPTCHA, CCS \u201908: Proc. 15th ACM conference on Computer and communications security, ACM, New York (2008) pp. 535\u2013542, doi:10.1145\/1455770.1455838","DOI":"10.1145\/1455770.1455838"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"R.\u00a0Datta, J.\u00a0Li, J.Z.\u00a0Wang: Imagination: a robust image-based CAPTCHA generation system, Proc. 13th ACM international conference on Multimedia (MULTIMEDIA \u201905) (ACM Press, New York 2005) pp. 331\u2013334","DOI":"10.1145\/1101149.1101218"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Rui, Z.\u00a0Liu: Artifacial: automated reverse turing test using facial features, MULTIMEDIA \u201903: Proc. 11th ACM Int. Conference on Multimedia, ACM, New York (2003) pp. 295\u2013298, doi:10.1145\/957013.957075","DOI":"10.1145\/957013.957075"},{"key":"15_CR46","series-title":"Electronic Notes in Theoretical Computer Science","first-page":"149","volume-title":"STM2007","author":"A. Basso","year":"2008","unstructured":"A.\u00a0Basso, M.\u00a0Miraglia: Avoiding massive automated voting in internet polls. In: STM2007, Electronic Notes in Theoretical Computer Science, Vol. 197(2) (Elsevier, Amsterdam 2008) pp. 149\u2013157, doi:10.1016\/j.entcs.2007.12.024"},{"key":"15_CR47","unstructured":"M. May: Inaccessibility of CAPTCHA: Alternatives to visual turing tests on the web, W3C Working Group Note, http:\/\/www.w3.org\/TR\/turingtest\/ (2005)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:58:30Z","timestamp":1739905110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_15","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}