{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:46:04Z","timestamp":1725763564061},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642452031"},{"type":"electronic","value":"9783642452048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45204-8_16","type":"book-chapter","created":{"date-parts":[[2013,12,11]],"date-time":"2013-12-11T07:04:25Z","timestamp":1386745465000},"page":"214-229","source":"Crossref","is-referenced-by-count":3,"title":["Web Services Based Attacks against Image CAPTCHAs"],"prefix":"10.1007","author":[{"given":"David","family":"Lorenzi","sequence":"first","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Asirra: a captcha that exploits interest-aligned manual image categorization. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 366\u2013374 (2007)"},{"key":"16_CR2","first-page":"1109","volume":"11","author":"G. Chechik","year":"2010","unstructured":"Chechik, G., Sharma, V., Shalit, U., Bengio, S.: Large scale online learning of image similarity through ranking. J. Mach. Learn. Res.\u00a011, 1109\u20131135 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Chew, M., Tygar, J.D.: Image recognition captchas. Technical Report UCB\/CSD-04-1333, EECS Department, University of California, Berkeley (June 2004)","DOI":"10.1007\/978-3-540-30144-8_23"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Datta, R., Li, J., Wang, J.Z.: Imagination: a robust image-based captcha generation system. In: Proceedings of the 13th Annual ACM International Conference on Multimedia, MULTIMEDIA 2005, pp. 331\u2013334 (2005)","DOI":"10.1145\/1101149.1101218"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: On the necessity of user-friendly captcha. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 2623\u20132626 (2011)","DOI":"10.1145\/1978942.1979325"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Gossweiler, R., Kamvar, M., Baluja, S.: What\u2019s up captcha?: a captcha based on image orientation. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, pp. 841\u2013850 (2009)","DOI":"10.1145\/1526709.1526822"},{"key":"16_CR7","unstructured":"Idee. Tineye reverse image search (July 2013), \n                  \n                    http:\/\/www.tineye.com"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Jing, Y., Baluja, S.: Pagerank for product image search. In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, pp. 307\u2013316 (2008)","DOI":"10.1145\/1367497.1367540"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Jing, Y., Rowley, H., Wang, J., Tsai, D., Rosenberg, C., Covell, M.: Google image swirl: a large-scale content-based image visualization system. In: Proceedings of the 21st International Conference Companion on World Wide Web, WWW 2012 Companion, pp. 539\u2013540 (2012)","DOI":"10.1145\/2187980.2188116"},{"issue":"6","key":"16_CR10","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TPAMI.2007.70847","volume":"30","author":"J. Li","year":"2008","unstructured":"Li, J., Wang, J.Z.: Real-time computerized annotation of pictures. IEEE Trans. Pattern Anal. Mach. Intell.\u00a030(6), 985\u20131002 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR11","unstructured":"Li, J., Wang, J.Z.: Automatic linguistic indexing of pictures in real-time (October 2012), \n                  \n                    http:\/\/www.alipr.com\/"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-35130-3_23","volume-title":"Information Systems Security","author":"D. Lorenzi","year":"2012","unstructured":"Lorenzi, D., Vaidya, J., Uzun, E., Sural, S., Atluri, V.: Attacking image based captchas using image recognition techniques. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol.\u00a07671, pp. 327\u2013342. Springer, Heidelberg (2012)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Matthews, P., Mantel, A., Zou, C.C.: Scene tagging: image-based captcha using image composition and object relationships. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 345\u2013350 (2010)","DOI":"10.1145\/1755688.1755736"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a captcha based on line drawings of 3d models. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 821\u2013830 (2010)","DOI":"10.1145\/1772690.1772774"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, S., Shirali-Shahreza, M.: Categorizing captcha. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, pp. 107\u2013108 (2011)","DOI":"10.1145\/2046684.2046703"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Srikanth, V., Vishwanathan, C., Asati, U., Iyengar, N.C.S.N.: Think-an image based captcha mechanism (testifying human based on intelligence and knowledge). In: Proceedings of the International Conference on Advances in Computing, Communication and Control, ICAC3 2009, pp. 421\u2013424 (2009)","DOI":"10.1145\/1523103.1523186"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Vikram, S., Fan, Y., Gu, G.: Semage: a new image-based two-factor captcha. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 237\u2013246 (2011)","DOI":"10.1145\/2076732.2076766"},{"issue":"2","key":"16_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM\u00a047(2), 56\u201360 (2004)","journal-title":"Commun. ACM"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, pp. 44\u201352 (2008)","DOI":"10.1145\/1408664.1408671"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K.: Attacks and design of image recognition captchas. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 187\u2013200 (2010)","DOI":"10.1145\/1866307.1866329"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45204-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T11:08:43Z","timestamp":1558782523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45204-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642452031","9783642452048"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45204-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}