{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:55Z","timestamp":1744086535061,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_33","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"323-335","source":"Crossref","is-referenced-by-count":3,"title":["A New Approach towards Segmentation for Breaking CAPTCHA"],"prefix":"10.1007","author":[{"given":"Anjali Avinash","family":"Chandavale","sequence":"first","affiliation":[]},{"given":"A.","family":"Sapkal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Breaking Visual CAPTCHAs with Na\u00efve Pattern Recognition Algorithms. In: 23rd Annual Computer Security Applications Conf., pp. 279\u2013291 (2007)","DOI":"10.1109\/ACSAC.2007.4412996"},{"key":"33_CR2","unstructured":"Huang, S., Lee, Y., Bell, G., Ou, Z.: A Projection-based Segmentation Algorithm for Breaking MSN and YAHOO CAPTCHAs. In: Proc. World Congress Eng., vol.\u00a01 (2008)"},{"issue":"11","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/34.888715","volume":"22","author":"Y. Chen","year":"2000","unstructured":"Chen, Y., Wang, Y.: Segmentation of Single- or Multiple-Touching Handwritten Numeral String Using Background and Foreground Analysis. IEEE Trans. Pattern Analysis Machine Intelligence\u00a022(11), 1304\u20131317 (2000)","journal-title":"IEEE Trans. Pattern Analysis Machine Intelligence"},{"key":"33_CR4","unstructured":"Simard, P., Szeliski, R., Benaloh, J., Couvreur, J., Calinov, I.: Using Character Recognition and Segmentation to Tell Computers from Humans. In: Int\u2019l Conference on Document Analysis and Recogntion, ICDAR (2003)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart Automatically. CACM\u00a047(2) (2004)","DOI":"10.1145\/966389.966390"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Baird, H.S., Moll, M.A., Wang, S.Y.: ScatterType: A Legible but Hard-to-Segment CAPTCHA. In: Eighth International Conference on Document Analysis and Recognition, pp. 935\u2013939 (August 2005)","DOI":"10.1109\/ICDAR.2005.205"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Chew, M., Baird, H.S.: BaffleText: a human interactive proof. In: Proceedings of 10th IS&T\/SPIE Document Recognition & Retrieval Conference, San Jose, CA, USA (2003)","DOI":"10.1117\/12.479682"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-04904-0_27","volume-title":"Security Protocols","author":"J. Yan","year":"2009","unstructured":"Yan, J.: Bot, Cyborg and Automated Turing Test. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a05087, pp. 198\u2013201. Springer, Heidelberg (2009)"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s10032-002-0089-1","volume":"5","author":"A.L. Coates","year":"2003","unstructured":"Coates, A.L., Baird, H.S., Fateman, R.J.: PessimalPrint: A Reverse Turing Test. Int\u2019l. J. on Document Analysis & Recognition\u00a05, 158\u2013163 (2003)","journal-title":"Int\u2019l. J. on Document Analysis & Recognition"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Pope, C., Kaur, K.: Is It Human or Computer? Defending E-Commerce with CAPTCHA. IEEE IT Professional, 43\u201349 (March 2005)","DOI":"10.1109\/MITP.2005.37"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: Advances in Neural Information Processing Systems 17, Neural Information Processing Systems (NIPS). MIT Press (2004)","DOI":"10.1145\/1054972.1055070"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/11427896_6","volume-title":"Human Interactive Proofs","author":"T. Converse","year":"2005","unstructured":"Converse, T.: CAPTCHA Generation as a Web Service. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 82\u201396. Springer, Heidelberg (2005)"},{"key":"33_CR13","unstructured":"Naccache, D., Whelan, C.: 9\/11: Who alerted the CIA (And Other Secret Secrets). Rump session, Eurocrypt (2004)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognising Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2003, vol.\u00a01, pp. 134\u2013141 (June 2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2004, vol.\u00a02, pp. 23\u201328 (June 2004)","DOI":"10.1109\/CVPR.2004.1315140"},{"issue":"7","key":"33_CR16","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/34.506792","volume":"18","author":"R.G. Casey","year":"1996","unstructured":"Casey, R.G., Lecolinet, E.: A Survey of Methods and Strategies in character segmentation. IEEE Trans. Pattern Analysis Machine Intelligence\u00a018(7), 690\u2013707 (1996)","journal-title":"IEEE Trans. Pattern Analysis Machine Intelligence"},{"issue":"27","key":"33_CR17","doi-asserted-by":"publisher","first-page":"127","DOI":"10.5120\/489-800","volume":"1","author":"A.A. Chandavale","year":"2010","unstructured":"Chandavale, A.A., Sapkal, A.M., Jalnekar, R.M.: A framework to analyze security of Text based CAPTCHA. Int. Journal of Forensics and Computer Application\u00a01(27), 127\u2013133 (2010)","journal-title":"Int. Journal of Forensics and Computer Application"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:35Z","timestamp":1744079375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}