{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:47:06Z","timestamp":1777657626973,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642341342","type":"print"},{"value":"9783642341359","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_10","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"97-109","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of CAPTCHA"],"prefix":"10.1007","author":[{"given":"Anjali Avinash","family":"Chandavale","sequence":"first","affiliation":[]},{"given":"A.","family":"Sapkal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/34.754617","volume":"21","author":"N. Kato","year":"1999","unstructured":"Kato, N., Suzuki, M., Omachi, S., Aso, H., Nemoto, Y.: A handwritten character recognition system using directional element feature and asymmetric Mahalanobis distance. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a021(3), 258\u2013262 (1999)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0031-3203(94)00068-W","volume":"28","author":"Y. Lu","year":"1995","unstructured":"Lu, Y.: Machine Printed Character Segmentation-An Overview. Pattern Recognition\u00a028(1), 67\u201380 (1995)","journal-title":"Pattern Recognition"},{"key":"10_CR3","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (automatically), CMU Tech. Report CMUCS-02-117 (2002)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: Proc. IEEE Conf. Computer Vision and Pattern Recognition, vol.\u00a01, pp. 134\u2013141 (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2004), vol.\u00a02, pp. 23\u201328 (2004)","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11427896_1","volume-title":"Human Interactive Proofs","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 1\u201326. Springer, Heidelberg (2005)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.E.: A Low-cost Attack on a Microsoft CAPTCHA. Technical report, School of Computing Science, Newcastle University, UK (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Rabkin, A.: Personal knowledge questions for fallback authentication: Security questions in the era of Face book. In: IEEE Symposium on Usable Privacy and Security, SOUPS 2008 (July 2008)","DOI":"10.1145\/1408664.1408667"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chandavale, A.A., Sapkal, A.M., Jalnekar, R.M.: A framework to analyze security of Text based CAPTCHA. International Journal of Forensics and Computer Application (February 2010)","DOI":"10.5120\/489-800"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/11427896_6","volume-title":"Human Interactive Proofs","author":"T. Converse","year":"2005","unstructured":"Converse, T.: CAPTCHA Generation as a Web Service. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 82\u201396. Springer, Heidelberg (2005)"},{"key":"10_CR12","unstructured":"Ahmad, A.E., Yan, J.: Colour, Usability and Security: A Case Study. Tech. report CS-TR 1203, School of Computing Science, Newcastle Univ. (May 2010), www.cs.ncl.ac.uk\/publications\/trs\/papers\/1203.pdf"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:54Z","timestamp":1744079394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}