{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:53:47Z","timestamp":1775199227631,"version":"3.50.1"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T00:00:00Z","timestamp":1275350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["830865"],"award-info":[{"award-number":["830865"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Access. Comput."],"published-print":{"date-parts":[[2010,6]]},"abstract":"<jats:p>The need for security features to stop spam and bots has prompted research aimed at developing human interaction proofs (HIPs) that are both secure and easy to use. The primarily visual techniques used in these HIP tools present difficulties for users with visual impairments. This article reports on the development of Human-Interaction Proof, Universally Usable (HIPUU), a new approach to human-interaction proofs based on identification of a series of sound\/image pairs. Simultaneous presentation of a single, unified task in two alternative modalities provides multiple paths to successful task completion. We present two alternative task completion strategies, based on differing input strategies (menu-based vs. free text entry). Empirical results from studies involving both blind and sighted users validate both the usability and accessibility of these differing strategies, with blind users achieving successful task completion rates above 90%. The strengths of the alternate task completion strategies are discussed, along with possible approaches for improving the robustness of HIPUU.<\/jats:p>","DOI":"10.1145\/1786774.1786776","type":"journal-article","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T12:20:45Z","timestamp":1277209245000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Towards A Universally Usable Human Interaction Proof"],"prefix":"10.1145","volume":"2","author":[{"given":"Graig","family":"Sauer","sequence":"first","affiliation":[{"name":"Towson University"}]},{"given":"Jonathan","family":"Lazar","sequence":"additional","affiliation":[{"name":"Towson University"}]},{"given":"Harry","family":"Hochheiser","sequence":"additional","affiliation":[{"name":"Towson University"}]},{"given":"Jinjuan","family":"Feng","sequence":"additional","affiliation":[{"name":"Towson University"}]}],"member":"320","published-online":{"date-parts":[[2010,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE Digital Signal Processing Workshop.","author":"Beritelli F.","unstructured":"Beritelli , F. , Casale , S. , Russo , A. , and Serrano , S . 2006. An automatic emergency signal recognition system for the hearing impaired . In Proceedings of the IEEE Digital Signal Processing Workshop. Beritelli, F., Casale, S., Russo, A., and Serrano, S. 2006. An automatic emergency signal recognition system for the hearing impaired. In Proceedings of the IEEE Digital Signal Processing Workshop."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_2_1_3_1","unstructured":"Bohr S. Shome A. and Simon J. 2008. Improving auditory CAPTCHA security. ISR Tech. rep. University of Maryland College Park MD. Bohr S. Shome A. and Simon J. 2008. Improving auditory CAPTCHA security. ISR Tech. rep. University of Maryland College Park MD."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526731"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055070"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 7th International Information Security Conference. Springer.","author":"Chew M.","unstructured":"Chew , M. and Tygar , J . 2004. Image recognition CAPTCHAs . In Proceedings of the 7th International Information Security Conference. Springer. Chew, M. and Tygar, J. 2004. Image recognition CAPTCHAs. In Proceedings of the 7th International Information Security Conference. Springer."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517531"},{"key":"e_1_2_1_8_1","volume-title":"Listen: Music recognition for iPhone","author":"Gadget Lab","year":"2009","unstructured":"Gadget Lab . 2009 . Listen: Music recognition for iPhone . http:\/\/www.wired.com\/gadgetlab\/2008\/01\/listen-music-re\/. Gadget Lab. 2009. Listen: Music recognition for iPhone. http:\/\/www.wired.com\/gadgetlab\/2008\/01\/listen-music-re\/."},{"key":"e_1_2_1_9_1","unstructured":"Gilleland M. 2009. Levenshtein distance in three flavors. http:\/\/www.merriampark.com\/ld.htm. Gilleland M. 2009. Levenshtein distance in three flavors. http:\/\/www.merriampark.com\/ld.htm."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290601176930"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Holman J. Lazar J. and Feng J. 2008. Investigating the security-related challenges of blind users on the Web. In Designing Inclusive Futures P. Langdon J. Clarkson and P. Robinson. Eds. Spring-Verlag. 129--138. Holman J. Lazar J. and Feng J. 2008. Investigating the security-related challenges of blind users on the Web. In Designing Inclusive Futures P. Langdon J. Clarkson and P. Robinson. Eds. Spring-Verlag. 129--138.","DOI":"10.1007\/978-1-84800-211-1_13"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296894"},{"key":"e_1_2_1_13_1","volume-title":"2005. Access by Design: A Guide to Universal Usability for Web Designers","author":"Horton S.","unstructured":"Horton , S. , Ed. 2005. Access by Design: A Guide to Universal Usability for Web Designers . New Riders Press . Horton, S., Ed. 2005. Access by Design: A Guide to Universal Usability for Web Designers. New Riders Press."},{"key":"e_1_2_1_14_1","unstructured":"Jones D. 2009. Personal communication. Jones D. 2009. Personal communication."},{"key":"e_1_2_1_15_1","volume-title":"Colour Blindness: Causes and Effects","author":"McIntyre D.","year":"2002","unstructured":"McIntyre , D. 2002 . Colour Blindness: Causes and Effects . Dalton Publishing . McIntyre, D. 2002. Colour Blindness: Causes and Effects. Dalton Publishing."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 134","author":"Mori G.","unstructured":"Mori , G. and Malik , J . 2003. Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA . In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 134 . Mori, G. and Malik, J. 2003. Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 134."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/800193.569925"},{"key":"e_1_2_1_18_1","unstructured":"Office of Governmentwide Policy. 2009. Section 508. www.section508.gov. Office of Governmentwide Policy . 2009. Section 508. www.section508.gov."},{"key":"e_1_2_1_19_1","unstructured":"Porter M. 2006. The Porter Stemming Algorithm. http:\/\/tartarus.org\/~martin\/PorterStemmer\/. Porter M. 2006. The Porter Stemming Algorithm. http:\/\/tartarus.org\/~martin\/PorterStemmer\/."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 9th International Conference on Speech and Computers.","author":"Reyes-Galaviz O.","unstructured":"Reyes-Galaviz , O. and Reyes-Garcia , C . 2004. A system for the processing of infant cry to recognize pathologies in recently born babies with neural networks . In Proceedings of the 9th International Conference on Speech and Computers. Reyes-Galaviz, O. and Reyes-Garcia, C. 2004. A system for the processing of infant cry to recognize pathologies in recently born babies with neural networks. In Proceedings of the 9th International Conference on Speech and Computers."},{"key":"e_1_2_1_21_1","unstructured":"Robinson S. 2002. Human or Computer? Take this test. The New York Times. Robinson S. 2002. Human or Computer? Take this test. The New York Times ."},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Sauer G. Holman J. Lazar J. Feng J. and Hochheiser H. 2009. Accessible privacy and security: A universally usable human-interaction proof. Univ. Access Inform. Soc. Sauer G. Holman J. Lazar J. Feng J. and Hochheiser H. 2009. Accessible privacy and security: A universally usable human-interaction proof. Univ. Access Inform. Soc.","DOI":"10.1007\/s10209-009-0171-2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332843"},{"key":"e_1_2_1_24_1","first-page":"1625","article-title":"Breaking audio CAPTCHAs","volume":"21","author":"Tam J.","year":"2009","unstructured":"Tam , J. , Simsa , V. , Hyde , S. , and Von Ahn , L. 2009 . Breaking audio CAPTCHAs . Adv. Neu. Inform. Process. Syst. 21 , 1625 -- 1632 . Tam, J., Simsa, V., Hyde, S., and Von Ahn, L. 2009. Breaking audio CAPTCHAs. Adv. Neu. Inform. Process. Syst. 21, 1625--1632.","journal-title":"Adv. Neu. Inform. Process. Syst."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"e_1_2_1_26_1","unstructured":"Von Ahn L. 2007. ReCAPTCHA: Stop spam read books. http:\/\/recaptcha.net\/. Von Ahn L. 2007. ReCAPTCHA: Stop spam read books. http:\/\/recaptcha.net\/."},{"key":"e_1_2_1_27_1","volume-title":"J","author":"Von Ahn L.","year":"2003","unstructured":"Von Ahn , L. , Blum , M. , Hopper , N. , and J. Langford , J . 2003 . CAPTCHA : Using Hard AI problems for security. In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT). Springer , 646. Von Ahn, L., Blum, M., Hopper, N., and J. Langford, J. 2003. CAPTCHA: Using Hard AI problems for security. In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT). Springer, 646."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"e_1_2_1_29_1","unstructured":"W3C. 2007. Inaccessibility of CAPTCHA. http:\/\/www.w3.org\/TR\/turingtest\/. W3C . 2007. Inaccessibility of CAPTCHA. http:\/\/www.w3.org\/TR\/turingtest\/."},{"key":"e_1_2_1_30_1","unstructured":"WebVisum. 2009. Web visum (vision in latin) is your eyes for the Web. http:\/\/www.webvisum.com\/. WebVisum . 2009. Web visum (vision in latin) is your eyes for the Web. http:\/\/www.webvisum.com\/."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027933.1028001"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference.","author":"Yan J.","unstructured":"Yan , J. and Ahmad , A. S. E. 2007. Breaking visual CAPTCHAs with naive pattern recognition algorithms . In Proceedings of the Annual Computer Security Applications Conference. Yan, J. and Ahmad, A. S. E. 2007. Breaking visual CAPTCHAs with naive pattern recognition algorithms. In Proceedings of the Annual Computer Security Applications Conference."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"}],"container-title":["ACM Transactions on Accessible Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1786774.1786776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1786774.1786776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:31Z","timestamp":1750246771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1786774.1786776"}},"subtitle":["Evaluation of Task Completion Strategies"],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,6]]}},"alternative-id":["10.1145\/1786774.1786776"],"URL":"https:\/\/doi.org\/10.1145\/1786774.1786776","relation":{},"ISSN":["1936-7228","1936-7236"],"issn-type":[{"value":"1936-7228","type":"print"},{"value":"1936-7236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6]]},"assertion":[{"value":"2009-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}