{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:59Z","timestamp":1740122879685,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219","U1736214"],"award-info":[{"award-number":["U1636219","U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1804263","61602508"],"award-info":[{"award-number":["U1804263","61602508"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772549"],"award-info":[{"award-number":["61772549"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R & D Program of China","doi-asserted-by":"crossref","award":["2016YFB0801303","2016QY 01W0105"],"award-info":[{"award-number":["2016YFB0801303","2016QY 01W0105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100018607","name":"Plan for Scientific Innovation Talent of Henan Province","doi-asserted-by":"crossref","award":["184200510018"],"award-info":[{"award-number":["184200510018"]}],"id":[{"id":"10.13039\/501100018607","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11042-021-11485-9","type":"journal-article","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T08:02:46Z","timestamp":1631260966000},"page":"13025-13043","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network"],"prefix":"10.1007","volume":"82","author":[{"given":"Jun","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3225-4649","authenticated-orcid":false,"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Liyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qikun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"11485_CR1","unstructured":"Alec R, Metz L, Chintala S (2016) Unsupervised representation learning with deep convolutional generative adversarial networks, arXiv preprint. https:\/\/arxiv.org\/abs\/1511.06434"},{"key":"11485_CR2","unstructured":"Brock A, Donahue J, Simonyan K (2019) Large scale GAN training for high fidelity natural image synthesis, In Proceedings of the International Conference on Learning Representations (ICLR). https:\/\/openreview.net\/pdf?id=B1xsqj09Fm"},{"key":"11485_CR3","doi-asserted-by":"crossref","unstructured":"Bursztein E, Martin M, Mitchell JC (2011) Text-based CAPTCHA strengths and weaknesses, In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 125\u2013137","DOI":"10.1145\/2046707.2046724"},{"key":"11485_CR4","unstructured":"Chang J, Gu Y, Zhang Y (2017) Chinese typography transfer, arXiv preprint. https:\/\/arxiv.org\/abs\/1707.04904"},{"key":"11485_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.neucom.2018.09.013","volume":"321","author":"M Frid-Adar","year":"2018","unstructured":"Frid-Adar M, Diamant I et al (2018) GAN-based synthetic medical image augmentation for increased CNN performance in liver lesion classification. Neurocomputing 321:321\u2013331","journal-title":"Neurocomputing"},{"key":"11485_CR6","unstructured":"Fiot JB, Paucher R (2009) The Captchacker project, Ecole Centrale Paris"},{"key":"11485_CR7","doi-asserted-by":"crossref","unstructured":"Gao H, Wang W, Fan Y (2012) Divide and conquer: An efficient attack on Yahoo! CAPTCHA, In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 9\u201316","DOI":"10.1109\/TrustCom.2012.131"},{"key":"11485_CR8","first-page":"1","volume-title":"et al","author":"H Gao","year":"2016","unstructured":"Gao H, Yan J et al (2016) A simple generic attack on text CAPTCHAs, In Proceedings of the Network and Distributed System Security Symposium (NDSS) 1\u201314"},{"key":"11485_CR9","doi-asserted-by":"crossref","unstructured":"George D, Lehrach W et al (2017) A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs. Science 356(6368):eaag2612","DOI":"10.1126\/science.aag2612"},{"key":"11485_CR10","unstructured":"Goodfellow IJ, Bulatov Y et al (2014) Multi-digit number recognition from street view imagery using deep convolutional neural networks, In Proceedings of the International Conference on Learning Representations (ICLR). https:\/\/www.researchgate.net\/publication\/259399973"},{"key":"11485_CR11","unstructured":"Goodfellow I, Papernot N, Huang S (2017) Attacking machine learning with adversarial examples, OpenAI. https:\/\/blog.openai.com\/adversarial-example-research\/"},{"key":"11485_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3025129","author":"Z Guang","year":"2020","unstructured":"Guang Z, Wan Z et al (2020) BlockMaze: an efficient privacy-preserving account-model blockchain based on zk-SNARKs. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2020.3025129","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"11485_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977646","author":"D Han","year":"2020","unstructured":"Han D, Pan N, Li K (2020) A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2020.2977646","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"11485_CR14","unstructured":"Huang H, Ma X et al (2021) Unlearnable examples: Making personal data unexploitable. In Proceedings of International Conference on Learning Representations (ICLR) arXiv preprint.\u00a0https:\/\/arxiv.org\/abs\/2101.04898"},{"key":"11485_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2017.632","author":"P Isola","year":"2017","unstructured":"Isola P, Zhu J, Zhou T et al (2017) Image-to-image translation with conditional adversarial networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). https:\/\/doi.org\/10.1109\/cvpr.2017.632","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"11485_CR16","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 4401-4410","DOI":"10.1109\/CVPR.2019.00453"},{"issue":"9","key":"11485_CR17","doi-asserted-by":"publisher","first-page":"7928","DOI":"10.1109\/JIOT.2020.2990428","volume":"7","author":"T Liu","year":"2020","unstructured":"Liu T, Wang Y et al (2020) Privacy protection based on stream cipher for spatiotemporal data in IoT. IEEE Internet of Things Journal 7(9):7928\u20137940","journal-title":"IEEE Internet of Things Journal"},{"key":"11485_CR18","unstructured":"Matan O, Burges CJC et al (1991) Multi-digit recognition using a space displacement neural network, In Proceedings of Advances in Neural Information Processing Systems (NIPS) 488\u2013495"},{"key":"11485_CR19","unstructured":"Moy G, Jones N et al (2004) Distortion estimation techniques in solving visual CAPTCHAs, In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) 1123\u20131128"},{"key":"11485_CR20","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.ins.2020.05.087","volume":"540","author":"Y Pu","year":"2020","unstructured":"Pu Y, Xiang T et al (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inform Sci 540:308\u2013324","journal-title":"Information Sciences"},{"issue":"4","key":"11485_CR21","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1016\/j.patcog.2014.09.006","volume":"48","author":"O Starostenko","year":"2015","unstructured":"Starostenko O, Cruz-Perez C et al (2015) Breaking text-based CAPTCHAs with variable word and character orientation. Patt Recognit 48(4):1097\u20131108","journal-title":"Pattern Recognition"},{"key":"11485_CR22","doi-asserted-by":"crossref","unstructured":"Von Ahn L, Blum M et al (2003) CAPTCHA: Using hard AI problems for security, In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) LNCS 2656:294\u2013311","DOI":"10.1007\/3-540-39200-9_18"},{"key":"11485_CR23","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2007) Breaking visual CAPTCHAs with native pattern recognition algorithms, In Proceedings of the Annual Computer Security Applications Conference (ACSAC) 279\u2013291","DOI":"10.1109\/ACSAC.2007.47"},{"key":"11485_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2999940","author":"Y Yang","year":"2020","unstructured":"Yang Y, Deng RH et al (2020) Privacy-preserving medical treatment system through nondeterministic finite automata. IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2020.2999940","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"11485_CR25","doi-asserted-by":"crossref","unstructured":"Ye G, Tang Z et al (2018) Yet another text CAPTCHA solver: A generative adversarial network based approach, In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 332\u2013348","DOI":"10.1145\/3243734.3243754"},{"key":"11485_CR26","unstructured":"Yosinski J, Clune J et al (2014) How transferable are features in deep neural networks? In Proceedings of Advances in Neural Information Processing Systems (NIPS) 3320\u20133328"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11485-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11485-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11485-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T10:15:10Z","timestamp":1679393710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11485-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["11485"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11485-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"15 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}