{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:40:09Z","timestamp":1745944809381,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357947"},{"type":"electronic","value":"9783642357954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35795-4_53","type":"book-chapter","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T09:49:42Z","timestamp":1357292982000},"page":"420-428","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA"],"prefix":"10.1007","author":[{"given":"Peipeng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Lihong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart Automatically. CACM\u00a047(2) (2004)","DOI":"10.1145\/966389.966390"},{"key":"53_CR2","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Computers beat humans at single character recognition in reading-based Human Interaction Proofs. In: 2nd Conference on Email and Anti-Spam, CEAS (2005)"},{"key":"53_CR3","first-page":"958","volume-title":"International Conference on Document Analysis and Recognition (ICDAR)","author":"P. Simard","year":"2003","unstructured":"Simard, P., Steinkraus, D., Platt, J.: Best Practice for Convolutional Neural Networks Applied to Visual Document Analysis. In: International Conference on Document Analysis and Recognition (ICDAR), pp. 958\u2013962. IEEE Computer Society, Los Alamitos (2003)"},{"key":"53_CR4","unstructured":"Simard, P., Szeliski, R., Benaloh, J., Couvreur, J., Calinov, I.: Using character recognition and segmentation to tell computers from humans. In: International Conference on Document Analysis and Recognition, ICDAR (2003)"},{"key":"53_CR5","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Huang, S.-Y., Lee, Y.-K., Bell, G., Ou, Z.-H.: An efficient segmentation algorithm for CAPTCHA with line cluttering and character warping (2009)","DOI":"10.1007\/s11042-009-0341-5"},{"key":"53_CR7","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Breaking Visual CAPTCHA with Na\u00efve Pattern Recognition Algorithms (2007)","DOI":"10.1109\/ACSAC.2007.4412996"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart Automatically. CACM\u00a047(2) (2004)","DOI":"10.1145\/966389.966390"},{"key":"53_CR9","unstructured":"Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs. In: Neural Information Processing Systems (NIPS). MIT Press (2004)"},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA. School of Computing Science Technical Report, Newcastle University, England (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Pope, C., Kaur, K.: Is It Human or Computer? Defending E-Commerce with CAPTCHA. IEEE IT Professional, pp. 43\u201349 (March 2005)","DOI":"10.1109\/MITP.2005.37"},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of CAPTCHAs - Or,Usability issues in CAPTCHA design. In: The Fourth Symposium on Usable Privacy and Security, Pittsburgh, USA (July 2008)","DOI":"10.1145\/1408664.1408671"},{"key":"53_CR13","unstructured":"Yan, J.: Bot, Cyborg and Automated Turing Test. In: The Fourteenth International Workshop on Security Protocols, Cambridge, UK (March 2006)"},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Baird, H.S., Bentley, J.L.: Implicit CAPTCHAs. In: Proceedings of Document Recognition an Retrieval XII, pp. 191\u2013196 (2005)","DOI":"10.1117\/12.590944"},{"key":"53_CR15","unstructured":"Huang, S.Y., Lee, Y.K., Bell, G., Ou, Z.H.: A projection-based segmentation algorithm for breaking MSN and YAHOO CAPTCHAs. In: Proceedings of the 2008 International Conference of Signal and Image Engineering (ICSIE 2008), London, UK (2008)"},{"key":"53_CR16","doi-asserted-by":"crossref","unstructured":"Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion estimation techniques in solving visual CAPTCHAs. In: Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol.\u00a02, pp. 23\u201328 (2004)","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"53_CR17","first-page":"265","volume-title":"Advances in Neural Information Processing Systems 17","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Simard, P.: Using machine learning to break visual human interaction proofs (HIPs). In: Saul, L.K., Weiss, Y., Bottou, L. (eds.) Advances in Neural Information Processing Systems 17, pp. 265\u2013272. MIT, Cambridge (2005)"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35795-4_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:59:52Z","timestamp":1745942392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35795-4_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642357947","9783642357954"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35795-4_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}