{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:09:48Z","timestamp":1725570588069},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_17","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"221-240","source":"Crossref","is-referenced-by-count":8,"title":["STE3D-CAP: Stereoscopic 3D CAPTCHA"],"prefix":"10.1007","author":[{"given":"Willy","family":"Susilo","sequence":"first","affiliation":[]},{"given":"Yang-Wai","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Hua-Yu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Anaglyph flash gallery, http:\/\/www.3dmix.com\/eng\/flash-gallery\/"},{"key":"17_CR2","unstructured":"Activision Blizzard. World of Warcraft, http:\/\/www.worldofwarcraft.com\/"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bigham, J.P., Cavender, A.C.: Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pp. 1829\u20131838 (2009)","DOI":"10.1145\/1518701.1518983"},{"key":"17_CR4","unstructured":"Bourke, P.: Calculating stereo pairs, http:\/\/local.wasp.uwa.edu.au\/~pbourke\/miscellaneous\/stereographics\/stereorender\/"},{"key":"17_CR5","unstructured":"Bourke, P., Morse, P.: Stereoscopy: Theory and Practice. In: Workshop at the 13th International Conference on Virtual Systems and Multimedia, VSMM 2007 (2007), http:\/\/local.wasp.uwa.edu.au\/~pbourke\/papers\/vsmm2007\/stereoscopy_workshop.pdf"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11427896_1","volume-title":"Human Interactive Proofs","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Building Segmentation Based Human-friendly Human Interaction Proofs. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 1\u201326. Springer, Heidelberg (2005)"},{"key":"17_CR7","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Computers beat humans at single character recognition in reading based human interaction proofs. In: 2nd Conference on Email and Anti-Spam (2005)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (HIPs). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 711\u2013720 (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-30144-8_23","volume-title":"Information Security","author":"M. Chew","year":"2004","unstructured":"Chew, M., Tygar, J.D.: Image Recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 268\u2013279. Springer, Heidelberg (2004)"},{"key":"17_CR10","unstructured":"Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (ACM CCS 2007), pp. 366\u2013374 (2007)"},{"key":"17_CR11","unstructured":"Gateau, S.: The In and Out: Making Games Play Right with Stereoscopic 3D Technologies. In: NVIDIA Presentation, Game Developers Conference 2009 (2009)"},{"key":"17_CR12","unstructured":"Gizmodo: Sony plans to introduce 3D LCD television by the end of 2010 (2010), http:\/\/gizmodo.com\/5350607\/sony-plans-to-introduce-3d-lcd-television-by-end-of-2010"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Golle, P.: Machine Learning Attacks Against the Asirra CAPTCHA. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (ACM CCS 2008), Conference on Computer and Communications Security, pp. 535\u2013542 (2008)","DOI":"10.1145\/1455770.1455838"},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1077246.1077255","volume":"3","author":"P. Golle","year":"2005","unstructured":"Golle, P., Ducheneaut, N.: Preventing bots from playing online games. Computers in Entertainment (CIE)\u00a03(3), 3 (2005)","journal-title":"Computers in Entertainment (CIE)"},{"key":"17_CR15","unstructured":"Google Images, http:\/\/images.google.com"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Jakobsson, M.: Captcha-free throttling. In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, pp. 15\u201322 (2009)","DOI":"10.1145\/1654988.1654994"},{"key":"17_CR17","unstructured":"McAllister, D.: 3D Displays. In: Wiley Encyclopedia on Imaging, pp. 1327\u20131344 (2002), http:\/\/research.csc.ncsu.edu\/stereographics\/wiley.pdf"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Mitra, N.J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H., Cohen-Or, D.: Emerging images. ACM Transactions on Graphics (TOG)\u00a028(5) (December 2009)","DOI":"10.1145\/1618452.1618509"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/3-540-45074-2","volume-title":"Energy Minimization Methods in Computer Vision and Pattern Recognition","author":"G. Mori","year":"2003","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Rangarajan, A., Figueiredo, M.A.T., Zerubia, J. (eds.) CVPR 2003. LNCS, vol.\u00a02683, pp. 134\u2013144. Springer, Heidelberg (2003)"},{"key":"17_CR20","unstructured":"Murph, D.: Intel shows off glasses-free 3D demo (2010), http:\/\/www.engadget.com\/2010\/01\/10\/intel-shows-off-glasses-free-3d-demo-now-this-is-more-like-it\/"},{"key":"17_CR21","unstructured":"NVIDIA. NVIDIA 3D Vision, http:\/\/www.nvidia.com\/object\/3D_Vision_Main.html"},{"key":"17_CR22","unstructured":"OCR Research Team. Teabag 3D Revolution, http:\/\/www.ocr-research.org.ua\/teabag.html"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1197\/jamia.M1147","volume":"10","author":"S. Ross","year":"2003","unstructured":"Ross, S., Chen, T.L.: The Effects of Promoting Patient Access To Medical Records. Journal of American Medical Informatics Association\u00a010, 129\u2013138 (2003)","journal-title":"Journal of American Medical Informatics Association"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Simard, P., Steinkraus, D., Platt, J.C.: Best practices for convolutional neural networks applied to visual document analysis. In: International Conference on Document Analysis and Recognition, pp. 958\u2013962 (2003)","DOI":"10.1109\/ICDAR.2003.1227801"},{"key":"17_CR25","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: The CAPTCHA web page, http:\/\/www.captcha.net"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"issue":"5895","key":"17_CR27","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science\u00a0321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"key":"17_CR28","unstructured":"VREX. DepthCharge V3 Browser Plug-In, http:\/\/www.vrex.com\/depthcharge\/"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: A Low-cost Attack on a Microsoft CAPTCHA. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (ACM CCS 2008), pp. 543\u2013554 (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Usability of CAPTCHAs - Or Usability issues in CAPTCHA design. In: Symposium on Usable Privacy and Security, SOUPS 2008, pp. 44\u201352 (2008)","DOI":"10.1145\/1408664.1408671"},{"key":"17_CR31","unstructured":"YUNiTi, http:\/\/www.yuniti.com"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:33:53Z","timestamp":1559842433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}