{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:17:44Z","timestamp":1768526264049,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642214233","type":"print"},{"value":"9783642214240","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_5","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T07:52:47Z","timestamp":1308124367000},"page":"56-67","source":"Crossref","is-referenced-by-count":25,"title":["Breaking reCAPTCHA: A Holistic Approach via Shape Recognition"],"prefix":"10.1007","author":[{"given":"Paul","family":"Baecher","sequence":"first","affiliation":[]},{"given":"Niklas","family":"B\u00fcscher","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Milde","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5895","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science\u00a0321(5895), 1465\u20131468 (2008) Cited on page 1","journal-title":"Science"},{"key":"5_CR2","first-page":"831","volume-title":"NIPS","author":"S. Belongie","year":"2000","unstructured":"Belongie, S., Malik, J., Puzicha, J.: Shape context: A new descriptor for shape matching and object recognition. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) NIPS, pp. 831\u2013837. MIT Press, Cambridge (2000) Cited on pages 2 and 4"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"J. Canny","year":"1986","unstructured":"Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell.\u00a08, 679\u2013698 (1986), http:\/\/portal.acm.org\/citation.cfm?id=11274.11275 Cited on page 6","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11427896_1","volume-title":"Human Interactive Proofs","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building segmentation based human-friendly human interaction proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 1\u201326. Springer, Heidelberg (2005) Cited on page 4"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Computers beat humans at single character recognition in reading based human interaction proofs (HIPs). In: CEAS (2005) Cited on page 4","DOI":"10.1145\/1054972.1055070"},{"issue":"5","key":"5_CR6","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/0167-8655(95)00125-5","volume":"17","author":"V. Govindaraju","year":"1996","unstructured":"Govindaraju, V., Krishnamurthy, R.K.: Holistic handwritten word recognition using temporal features derived from off-line images. Pattern Recognition Letters\u00a017(5), 537\u2013540 (1996) Cited on page 5","journal-title":"Pattern Recognition Letters"},{"key":"5_CR7","unstructured":"Houck, C.W.: Decoding recaptcha (2010), http:\/\/www.n3on.org\/projects\/reCAPTCHA\/docs\/reCAPTCHA.docx Cited on pages 3 and 6"},{"key":"5_CR8","first-page":"278","volume-title":"DIAL","author":"V. Lavrenko","year":"2004","unstructured":"Lavrenko, V., Rath, T.M., Manmatha, R.: Holistic word recognition for handwritten historical documents. In: DIAL, pp. 278\u2013287. IEEE Computer Society Press, Los Alamitos (2004) Cited on page 5"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-540-72849-8_37","volume-title":"Pattern Recognition and Image Analysis","author":"J. Llad\u00f3s","year":"2007","unstructured":"Llad\u00f3s, J., Roy, P.P., Rodr\u00edguez, J.A., S\u00e1nchez, G.: Word spotting in archive documents using shape contexts. In: Mart\u00ed, J., Bened\u00ed, J.M., Mendon\u00e7a, A.M., Serrat, J. (eds.) IbPRIA 2007. LNCS, vol.\u00a04478, pp. 290\u2013297. Springer, Heidelberg (2007) Cited on page 4"},{"key":"5_CR10","first-page":"536","volume-title":"ICDAR","author":"S. Madhvanath","year":"1997","unstructured":"Madhvanath, S., Govindaraju, V.: Contour-based image preprocessing for holistic handwritten word recognition. In: ICDAR, pp. 536\u2013539. IEEE Computer Society Press, Los Alamitos (1997) Cited on page 5"},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/34.908966","volume":"23","author":"S. Madhvanath","year":"2001","unstructured":"Madhvanath, S., Govindaraju, V.: The role of holistic paradigms in handwritten word recognition. IEEE Trans. Pattern Anal. Mach. Intell.\u00a023(2), 149\u2013164 (2001) Cited on page 5","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR12","first-page":"723","volume-title":"CVPR","author":"G. Mori","year":"2001","unstructured":"Mori, G., Belongie, S., Malik, J.: Shape contexts enable efficient retrieval of similar shapes. In: CVPR, vol.\u00a01, pp. 723\u2013730. IEEE Computer Society Press, Los Alamitos (2001) Cited on page 4"},{"issue":"11","key":"5_CR13","doi-asserted-by":"crossref","first-page":"1832","DOI":"10.1109\/TPAMI.2005.220","volume":"27","author":"G. Mori","year":"2005","unstructured":"Mori, G., Belongie, S.J., Malik, J.: Efficient shape matching using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 27(11), 1832\u20131837 (2005) Cited on page 9","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR14","first-page":"134","volume-title":"CVPR","author":"G. Mori","year":"2003","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: CVPR, vol.\u00a01, pp. 134\u2013144. IEEE Computer Society Press, Los Alamitos (2003) Cited on page 4"},{"key":"5_CR15","unstructured":"Vertanen, K.: Words in 10 lists (2010), http:\/\/www.keithv.com\/software\/ Cited on page 10"},{"key":"5_CR16","unstructured":"Wilkins, J.: Strong CAPTCHA guidelines v1.2 (2009), http:\/\/www.bitland.net\/ Cited on page 3"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T02:00:28Z","timestamp":1637805628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_5","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}