{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:07:33Z","timestamp":1772737653735,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,1,6]],"date-time":"2015-01-06T00:00:00Z","timestamp":1420502400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11760-014-0741-5","type":"journal-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T03:20:46Z","timestamp":1420428046000},"page":"293-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["A new implementation of chaotic S-boxes in CAPTCHA"],"prefix":"10.1007","volume":"10","author":[{"given":"Majid","family":"Khan","sequence":"first","affiliation":[]},{"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Syeda Iram","family":"Batool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,6]]},"reference":[{"key":"741_CR1","unstructured":"von Ahn, L, Blum, M, Hopper, N.J., Langford, J.: The CAPTCHA Web Page: http:\/\/www.captcha.net (2000)"},{"key":"741_CR2","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (automatically) or how lazy cryptographers do AI. Commun. ACM 47, 57\u201360 (2004)","DOI":"10.1145\/966389.966390"},{"key":"741_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In 38th IEEE Symposium on Foundations of Computer Science (FOCS\u2019 97), pp. 374\u2013383. IEEE Computer Society (1997)","DOI":"10.1109\/SFCS.1997.646126"},{"key":"741_CR4","volume-title":"Bongard. Pattern Recognition","author":"M Mikhail","year":"1970","unstructured":"Mikhail, M.: Bongard. Pattern Recognition. Spartan Books, Rochelle Park (1970)"},{"key":"741_CR5","doi-asserted-by":"crossref","unstructured":"Coates, A.L., Baird, H.S., Fateman, R.J.: Pessimal print: a reverse turing test. In proceedings of the international conference on document analysis and recognition (ICDAR\u2019 01), pp. 1154\u20131159. Seattle WA, (2001)","DOI":"10.1109\/ICDAR.2001.953966"},{"key":"741_CR6","doi-asserted-by":"crossref","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In Proceedings of the Second international information hiding workshop, pp. 355\u2013368. Springer, (1998)","DOI":"10.1007\/3-540-49380-8_25"},{"key":"741_CR7","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Barbara, S. (ed.) Advances in Cryptology. CRYPTO\u2019 02, volume 2442 of Lecture Notes in Computer Science, pp. 77\u201392. CA, (2002)","DOI":"10.1007\/3-540-45708-9_6"},{"key":"741_CR8","unstructured":"Lillibridge, M.D., Abadi, M., Bharat, K., Broder, A.: Method for selectively restricting access to computer systems. US Patent 6,195,698. Applied April 1998 and Approved Feb 2001"},{"key":"741_CR9","unstructured":"Mori, G., Malik, J.: Breaking a visual CAPTCHA. Unpublished Manuscript, 2002. Available electronically: http:\/\/www.cs.berkeley.edu\/~mori\/gimpy\/gimpy.pdf"},{"key":"741_CR10","unstructured":"Naor, M.: Verification of a human in the loop or Identification via the Turing Test. Unpublished Manuscript, 1997. Available electronically: http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human.ps"},{"key":"741_CR11","doi-asserted-by":"crossref","unstructured":"Pinkas, B, Sander, T.: Securing passwords against dictionary attacks. In Proceedings of the ACM Computer and Security Conference (CCS\u2019 02), pp. 161\u2013170. ACM Press, (2002)","DOI":"10.1145\/586110.586133"},{"key":"741_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5021-1","volume-title":"Optical Character Recognition: An Illustrated Guide to the Frontier","author":"S Rice","year":"1999","unstructured":"Rice, S., Nagy, G., Nartker, T.: Optical Character Recognition: An Illustrated Guide to the Frontier. Kluwer Academic Publishers, Boston (1999)"},{"key":"741_CR13","doi-asserted-by":"crossref","unstructured":"Shamir, A., Tromer, E.: Factoring large numbers with the TWIRL device. Unpublished Manuscript, 2003. Available electronically: http:\/\/www.cryptome.org\/twirl.ps.gz","DOI":"10.1007\/978-3-540-45146-4_1"},{"key":"741_CR14","unstructured":"Xu, J., Lipton, R., Essa, I..: Hello, are you human. Technical Report GIT-CC-00-28, Georgia Institute of Technology, November (2000)"},{"issue":"2013","key":"741_CR15","first-page":"493","volume":"71","author":"M Khan","year":"2013","unstructured":"Khan, M., Shah, T., Mahmood, H.: Muhammad Asif Gondal. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(2013), 493\u2013504 (2013)","journal-title":"Nonlinear Dyn."},{"issue":"2013","key":"741_CR16","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan, M., Shah, T.: Muhammad Asif Gondal. An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013), 1795\u20131801 (2013)","journal-title":"Nonlinear Dyn"},{"key":"741_CR17","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s11071-013-1132-0","volume":"76","author":"M Khan","year":"2014","unstructured":"Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76, 377\u2013382 (2014)","journal-title":"Nonlinear Dyn"},{"key":"741_CR18","doi-asserted-by":"crossref","unstructured":"Khan, M., Shah, T.: An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. (2013). doi: 10.1007\/s11760-013-0577-4","DOI":"10.1007\/s11760-013-0577-4"},{"key":"741_CR19","doi-asserted-by":"crossref","unstructured":"Khan, M., Shah, T.: A novel image encryption technique based on H\u00e9non chaotic map and S $$_8$$ 8 symmetric group, Neural Comput & Applic. (2014). doi: 10.1007\/s00521-014-1663-4","DOI":"10.1007\/s00521-014-1663-4"},{"key":"741_CR20","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s13319-014-0016-5","volume":"5","author":"M Khan","year":"2014","unstructured":"Khan, M., Shah, T.: A novel statistical analysis of chaotic s-box in image encryption. 3D Res 5, 16 (2014). doi: 10.1007\/s13319-014-0016-5","journal-title":"3D Res"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0741-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-014-0741-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0741-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T22:10:20Z","timestamp":1747347020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-014-0741-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,6]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["741"],"URL":"https:\/\/doi.org\/10.1007\/s11760-014-0741-5","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,6]]}}}