{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:23Z","timestamp":1750306523861,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2664243.2664262","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"276-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Using automatic speech recognition for attacking acoustic CAPTCHAs"],"prefix":"10.1145","author":[{"given":"Hendrik","family":"Meutzner","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Viet-Hung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Dorothea","family":"Kolossa","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ISR","author":"Bohr S.","year":"2008","unstructured":"S. Bohr , A. Shome , and J. Z. Simon . Improving Auditory CAPTCHA Security. Technical report , ISR , A. James Clark School of Engineering , 2008 . S. Bohr, A. Shome, and J. Z. Simon. Improving Auditory CAPTCHA Security. Technical report, ISR, A. James Clark School of Engineering, 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"Auditory scene analysis: The perceptual organization of sound","author":"Bregman A. S.","year":"1994","unstructured":"A. S. Bregman . Auditory scene analysis: The perceptual organization of sound . MIT press , 1994 . A. S. Bregman. Auditory scene analysis: The perceptual organization of sound. MIT press, 1994."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.14"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. WOOT","author":"Bursztein E.","year":"2009","unstructured":"E. Bursztein and S. Bethard . Decaptcha Breaking 75% of eBay Audio CAPTCHAs . In Proc. WOOT , 2009 . E. Bursztein and S. Bethard. Decaptcha Breaking 75% of eBay Audio CAPTCHAs. In Proc. WOOT, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427896_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101218"},{"key":"e_1_3_2_1_7_1","unstructured":"dfactory. Math Captcha 2014. http:\/\/wordpress.org\/plugins\/wp-math-captcha\/.  dfactory. Math Captcha 2014. http:\/\/wordpress.org\/plugins\/wp-math-captcha\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/b99695"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2006.285353"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000004"},{"key":"e_1_3_2_1_12_1","unstructured":"Google. reCAPTCHA. http:\/\/www.recaptcha.net.  Google. reCAPTCHA. http:\/\/www.recaptcha.net."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1985.1168384"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.35"},{"key":"e_1_3_2_1_15_1","volume-title":"Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups","author":"Hinton G.","year":"2012","unstructured":"G. Hinton , L. Deng , D. Yu , G. E. Dahl , A.-r. Mohamed , N. Jaitly , A. Senior , V. Vanhoucke , P. Nguyen , T. N. Sainath , Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups . IEEE Signal Processing Magazine , 2012 . G. Hinton, L. Deng, D. Yu, G. E. Dahl, A.-r. Mohamed, N. Jaitly, A. Senior, V. Vanhoucke, P. Nguyen, T. N. Sainath, et al. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine, 2012."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. INTERSPEECH","author":"Kochanski G.","year":"2002","unstructured":"G. Kochanski , D. P. Lopresti , and C. Shih . A reverse turing test using speech . In Proc. INTERSPEECH , 2002 . G. Kochanski, D. P. Lopresti, and C. Shih. A reverse turing test using speech. In Proc. INTERSPEECH, 2002."},{"key":"e_1_3_2_1_17_1","volume-title":"TIDIGITS Linguistic Data Consortium","author":"Leonard R. G.","year":"1993","unstructured":"R. G. Leonard and G. Doddington . TIDIGITS Linguistic Data Consortium , 1993 . Linguistic Data Consortium . R. G. Leonard and G. Doddington. TIDIGITS Linguistic Data Consortium, 1993. Linguistic Data Consortium."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.1.1"},{"key":"e_1_3_2_1_19_1","volume-title":"Speech Processing in the Auditory System","author":"Morgan N.","year":"2004","unstructured":"N. Morgan , H. Bourlard , and H. Hermansky . Automatic Speech Recognition: An Auditory Perspective . In Speech Processing in the Auditory System . Springer , 2004 . N. Morgan, H. Bourlard, and H. Hermansky. Automatic Speech Recognition: An Auditory Perspective. In Speech Processing in the Auditory System. Springer, 2004."},{"key":"e_1_3_2_1_20_1","unstructured":"picatcha.com 2014. http:\/\/picatcha.com.  picatcha.com 2014. http:\/\/picatcha.com."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/153687"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41383-4_3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5120\/451-754"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. SOUPS","author":"Tam J.","year":"2008","unstructured":"J. Tam , J. Simsa , D. Huggins-Daines , L. von Ahn , and M. Blum . Improving Audio CAPTCHAs . In Proc. SOUPS , 2008 . J. Tam, J. Simsa, D. Huggins-Daines, L. von Ahn, and M. Blum. Improving Audio CAPTCHAs. In Proc. SOUPS, 2008."},{"key":"e_1_3_2_1_26_1","volume-title":"Ahn. Breaking Audio CAPTCHAs. In Proc. NIPS","author":"Tam J.","year":"2008","unstructured":"J. Tam , J. Simsa , S. Hyde , and L. von Ahn. Breaking Audio CAPTCHAs. In Proc. NIPS , 2008 . J. Tam, J. Simsa, S. Hyde, and L. von Ahn. Breaking Audio CAPTCHAs. In Proc. NIPS, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(93)90095-3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481057"},{"key":"e_1_3_2_1_29_1","volume-title":"CAPTCHA: Using Hard AI Problems for Security","author":"von Ahn L.","year":"2003","unstructured":"L. von Ahn , M. Blum , N. J. Hopper , and J. Langford . CAPTCHA: Using Hard AI Problems for Security . In EUROCRYPT. Springer , 2003 . L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT. Springer, 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.47"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"e_1_3_2_1_33_1","volume-title":"The HTK Hidden Markov Model Toolkit: Design and Philosophy","author":"Young S.","year":"1994","unstructured":"S. Young . The HTK Hidden Markov Model Toolkit: Design and Philosophy . Entropic Cambridge Research Laboratory, Ltd , 1994 . S. Young. The HTK Hidden Markov Model Toolkit: Design and Philosophy. Entropic Cambridge Research Laboratory, Ltd, 1994."}],"event":{"name":"ACSAC '14: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '14"},"container-title":["Proceedings of the 30th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664243.2664262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:01Z","timestamp":1750227121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664262"}},"subtitle":["the trade-off between usability and security"],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":32,"alternative-id":["10.1145\/2664243.2664262","10.1145\/2664243"],"URL":"https:\/\/doi.org\/10.1145\/2664243.2664262","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}