{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:49:06Z","timestamp":1729612146016,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/icci-cc.2014.6921454","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:14:51Z","timestamp":1414008891000},"page":"146-154","source":"Crossref","is-referenced-by-count":3,"title":["Design of a Human Interaction Proof (HIP) using human cognition in contextual natural conversation"],"prefix":"10.1109","author":[{"given":"Mir Tafseer","family":"Nayeem","sequence":"first","affiliation":[]},{"given":"Md. Mamunur Rashid","family":"Akand","sequence":"additional","affiliation":[]},{"given":"Nazmus","family":"Sakib","sequence":"additional","affiliation":[]},{"given":"Md. Wasi Ul","family":"Kabir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"366","article-title":"Asirra: A Captcha that exploits interest aligned manual image categorization","author":"elson","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and communications security CCS '07"},{"year":"0","key":"35"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1752046.1752052"},{"year":"0","key":"36"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/SP.2010.31"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1117\/12.479682"},{"key":"15","first-page":"265","article-title":"Using machine learning to break visual human interaction proofs (hips)","author":"chellapilla","year":"2005","journal-title":"Advances in neural information processing systems"},{"year":"0","key":"34"},{"year":"0","key":"16"},{"key":"39","article-title":"Usability of CAPTCHAs or usability issues","author":"yan","year":"0","journal-title":"CAPTCHA Design?"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1455770.1455839"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"37","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1145\/1054972.1055070","article-title":"Designing human friendly human interaction proofs (hips)","author":"chellapilla","year":"2005","journal-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI'05"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1135777.1135827"},{"key":"38","article-title":"Exploiting context in hci design for mobile systems","author":"rodden","year":"1998","journal-title":"Human Computer Interaction with Mobile Devices"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1178618.1178619"},{"key":"21","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-540-30144-8_23","article-title":"Image recognition captchas","author":"chew","year":"2004","journal-title":"Proceedings of the 7th International Information Security Conference (ISC)"},{"year":"0","key":"20"},{"year":"0","key":"43"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1109\/MINES.2009.298"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1109\/TAI.2003.1250195"},{"year":"0","key":"40"},{"key":"45","article-title":"Move &select: 2-layer captcha based on cognitive psychology for securing web services","volume":"11","author":"tanvee","year":"2011","journal-title":"International Journal of Video &Image Processing and Network Security IJVIPNS \/ IJENS"},{"key":"44","first-page":"1","article-title":"Everybody tubes: Analyzing the world'slargest user generated content video system","author":"cha","year":"2007","journal-title":"Proc IMC2007"},{"year":"2003","author":"nielsen","journal-title":"Usability 101 Introduction to Usability","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1145\/1101149.1101218"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/1755688.1755736","article-title":"Scene tagging: Image-based Captcha using image composition and object relationships","author":"matthews","year":"2010","journal-title":"Proceedings of the 5th ACM Symposium on Information Computer and Communications Security ASIACCS '10"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1145\/1866307.1866329"},{"year":"0","key":"27"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1145\/1518701.1518983"},{"year":"0","journal-title":"Audio and Visual Captcha","key":"29"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1093\/mind\/LIX.236.433"},{"year":"2000","author":"blum","journal-title":"The captcha project Completely automatic public Turing test to tell computers and humans apart","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-3-540-72079-9"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/966389.966390"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/ISECS.2010.65"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1455770.1455838"},{"year":"0","key":"6"},{"year":"0","key":"32"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1572532.1572551"},{"year":"0","journal-title":"Carnegie Mellon","key":"31"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ICISA.2011.5772421"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1080\/0144341910110301"},{"key":"8","first-page":"2623","article-title":"On the necessity of userfriendly captcha","author":"fidas","year":"2011","journal-title":"Proc CHI 2011"}],"event":{"name":"2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","start":{"date-parts":[[2014,8,18]]},"location":"London, UK","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911098\/6921429\/06921454.pdf?arnumber=6921454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T14:13:20Z","timestamp":1565964800000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icci-cc.2014.6921454","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}