{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:14Z","timestamp":1750308554280,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1145\/2752952.2753065","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"169-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Generating Secure Images for CAPTCHAs through Noise Addition"],"prefix":"10.1145","author":[{"given":"David","family":"Lorenzi","sequence":"first","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Pratik","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, India"}]},{"given":"Emre","family":"Uzun","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, India"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600150.1600167"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"C.\n      Fritsch M.\n      Netter A.\n      Reisser and \n      G.\n      Pernul\n  . \n  Attacking image recognition captchas\n  . In S. Katsikas J. Lopez and M. Soriano editors Trust Privacy\n   and Security in Digital Business volume \n  6264\n   of \n  Lecture Notes in Computer Science pages \n  13\n  --\n  25\n  . \n  Springer Berlin Heidelberg 2010\n  .   C. Fritsch M. Netter A. Reisser and G. Pernul. Attacking image recognition captchas. In S. Katsikas J. Lopez and M. Soriano editors Trust Privacy and Security in Digital Business volume 6264 of Lecture Notes in Computer Science pages 13--25. Springer Berlin Heidelberg 2010.","DOI":"10.1007\/978-3-642-15152-1_2"},{"key":"e_1_3_2_1_3_1","volume-title":"Multi-digit number recognition from street view imagery using deep convolutional neural networks. CoRR, abs\/1312.6082","author":"Goodfellow I. J.","year":"2013","unstructured":"I. J. Goodfellow , Y. Bulatov , J. Ibarz , S. Arnoud , and V. Shet . Multi-digit number recognition from street view imagery using deep convolutional neural networks. CoRR, abs\/1312.6082 , 2013 . I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, and V. Shet. Multi-digit number recognition from street view imagery using deep convolutional neural networks. CoRR, abs\/1312.6082, 2013."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proceedings of the 2010 International Conference on","author":"Hernandez-Castro C. J.","year":"2010","unstructured":"C. J. Hernandez-Castro , A. Ribagorda , and Y. Saez . Side-channel attack on the humanauth captcha. In Security and Cryptography (SECRYPT) , Proceedings of the 2010 International Conference on , pages 1 -- 7 , July 2010 . C. J. Hernandez-Castro, A. Ribagorda, and Y. Saez. Side-channel attack on the humanauth captcha. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1--7, July 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Sept","author":"I. Inc.","year":"2014","unstructured":"I. Inc. Tineye reverse image search. https:\/\/www.tineye.com\/ , Sept 2014 . I. Inc. Tineye reverse image search. https:\/\/www.tineye.com\/, Sept 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"M. Inc. Documentation center - imnoise. http:\/\/www.mathworks.com\/help\/images\/ref\/imnoise.html Sept 2014.  M. Inc. Documentation center - imnoise. http:\/\/www.mathworks.com\/help\/images\/ref\/imnoise.html Sept 2014."},{"key":"e_1_3_2_1_7_1","first-page":"39","volume-title":"AISC '10","author":"Lang S. R.","year":"2010","unstructured":"S. R. Lang and N. Williams . Impeding captcha breakers with visual decryption . In AISC '10 , pages 39 -- 46 , 2010 . S. R. Lang and N. Williams. Impeding captcha breakers with visual decryption. In AISC '10, pages 39--46, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_24"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45204-8_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35130-3_23"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755736"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2012.29"}],"event":{"name":"SACMAT '15: 20th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"SACMAT '15"},"container-title":["Proceedings of the 20th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2752952.2753065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2752952.2753065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:52Z","timestamp":1750273432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2752952.2753065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":12,"alternative-id":["10.1145\/2752952.2753065","10.1145\/2752952"],"URL":"https:\/\/doi.org\/10.1145\/2752952.2753065","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]},"assertion":[{"value":"2015-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}