{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T20:10:24Z","timestamp":1742847024026,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_12","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:10:23Z","timestamp":1333339823000},"page":"170-181","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family"],"prefix":"10.1007","author":[{"given":"Yang-Wai","family":"Chow","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11427896_2","volume-title":"Human Interactive Proofs","author":"H.S. Baird","year":"2005","unstructured":"Baird, H.S., Moll, M.A., Wang, S.-Y.: A Highly Legible CAPTCHA That Resists Segmentation Attacks. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 27\u201341. Springer, Heidelberg (2005)"},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1023\/A:1008160311296","volume":"35","author":"S. Birchfield","year":"1999","unstructured":"Birchfield, S., Tomasi, C.: Depth discontinuities by pixel-to-pixel stereo. International Journal of Computer Vision\u00a035(3), 269\u2013293 (1999)","journal-title":"International Journal of Computer Vision"},{"key":"12_CR3","unstructured":"Bourke, P., Morse, P.: Stereoscopy: Theory and Practice. In: Workshop at the 13th International Conference on Virtual Systems and Multimedia, VSMM 2007 (2007), http:\/\/local.wasp.uwa.edu.au\/~pbourke\/papers\/vsmm2007\/stereoscopy_workshop.pdf"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11427896_1","volume-title":"Human Interactive Proofs","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 1\u201326. Springer, Heidelberg (2005)"},{"key":"12_CR5","unstructured":"Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a CAPTCHA that Exploits Interest-Aligned Manual Image Categorization. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 366\u2013374. ACM (2007)"},{"key":"12_CR6","unstructured":"McAllister, D.: 3D Displays. Wiley Encyclopedia on Imaging, Pacific Grove, CA (2002)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Mitra, N.J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H., Cohen-Or, D.: Emerging Images. ACM Trans. Graph.\u00a028(5) (2009)","DOI":"10.1145\/1618452.1618509"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: CVPR (1), pp. 134\u2013144 (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a CAPTCHA based on Line Drawings of 3D Models. In: Rappa, M., Jones, P., Freire, J., Chakrabarti, S. (eds.) WWW, pp. 821\u2013830. ACM (2010)","DOI":"10.1145\/1772690.1772774"},{"issue":"1-3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1014573219977","volume":"47","author":"D. Scharstein","year":"2002","unstructured":"Scharstein, D., Szeliski, R.: A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. International Journal of Computer Vision\u00a047(1-3), 7\u201342 (2002)","journal-title":"International Journal of Computer Vision"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-17619-7_17","volume-title":"Cryptology and Network Security","author":"W. Susilo","year":"2010","unstructured":"Susilo, W., Chow, Y.W., Zhou, H.: STE3D-CAP: Stereoscopic 3D CAPTCHA. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol.\u00a06467, pp. 221\u2013240. Springer, Heidelberg (2010)"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TPAMI.2006.42","volume":"28","author":"Y. Tsin","year":"2006","unstructured":"Tsin, Y., Kang, S.B., Szeliski, R.: Stereo matching with linear superposition of layers. IEEE Trans. Pattern Anal. Mach. Intell.\u00a028(2), 290\u2013301 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: A Low-Cost Attack on a Microsoft CAPTCHA. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 543\u2013554. ACM (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Usability of CAPTCHAs or Usability Issues in CAPTCHA Design. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, pp. 44\u201352. ACM (2008)","DOI":"10.1145\/1408664.1408671"},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2009.84","volume":"7","author":"J. Yan","year":"2009","unstructured":"Yan, J., Ahmad, A.S.E.: CAPTCHA Security: A Case Study. IEEE Security & Privacy\u00a07(4), 22\u201328 (2009)","journal-title":"IEEE Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:50:12Z","timestamp":1742845812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}