{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:51:09Z","timestamp":1771519869571,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T00:00:00Z","timestamp":1716595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,25]]},"DOI":"10.1145\/3660853.3660927","type":"proceedings-article","created":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T12:21:56Z","timestamp":1719145316000},"page":"273-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Image-Based CAPTCHA Recognition Using Deep Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1935-6018","authenticated-orcid":false,"given":"Huthaifa Mohammed","family":"Kanoosh","sequence":"first","affiliation":[{"name":"Tikrit University, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4455-6555","authenticated-orcid":false,"given":"Ammar Farooq","family":"Abbas","sequence":"additional","affiliation":[{"name":"Tikrit University, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3673-3412","authenticated-orcid":false,"given":"Noora Nazar","family":"Kamal","sequence":"additional","affiliation":[{"name":"Al Hikma University College, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3080-1907","authenticated-orcid":false,"given":"Zainab Mejeed","family":"Khadim","sequence":"additional","affiliation":[{"name":"Al-Mamoon University College, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4346-0683","authenticated-orcid":false,"given":"Duaa A.","family":"Majeed","sequence":"additional","affiliation":[{"name":"Baghdad University, Bayan University, Al-Ayen University, Afghanistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5483-6271","authenticated-orcid":false,"given":"Sameer","family":"Algburi","sequence":"additional","affiliation":[{"name":"Al-Kitab University, Iraq"}]}],"member":"320","published-online":{"date-parts":[[2024,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0381"},{"key":"e_1_3_2_1_2_1","volume-title":"On random field completely automated public turing test to tell computers and humans apart generation","author":"Kouritzin M. A.","year":"2012","unstructured":"Kouritzin, M. A., Newton, F., & Wu, B. (2012). On random field completely automated public turing test to tell computers and humans apart generation. IEEE transactions on image processing, 22(4), 1656-1666."},{"key":"e_1_3_2_1_3_1","volume-title":"Cracking Captcha Completely Automated Public Turing Test to Tell Computers and Humans Apart","author":"Singh K.","year":"2014","unstructured":"Singh, K., & Saha, S. (2014). Cracking Captcha Completely Automated Public Turing Test to Tell Computers and Humans Apart."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_2_1_5_1","volume-title":"Is it human or computer? Defending E-commerce with Captchas. IT professional, 7(2), 43-49","author":"Pope C.","year":"2005","unstructured":"Pope, C., & Kaur, K. (2005). Is it human or computer? Defending E-commerce with Captchas. IT professional, 7(2), 43-49."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237041"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.109"},{"key":"e_1_3_2_1_9_1","volume-title":"Workshop new challenges in neural computation (Vol.","author":"Stark F.","year":"2015","unstructured":"Stark, F., Haz\u0131rbas, C., Triebel, R., & Cremers, D. (2015, October). Captcha recognition with active deep learning. In Workshop new challenges in neural computation (Vol. 2015, p. 94)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312547"},{"key":"e_1_3_2_1_11_1","volume-title":"Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. computers & security, 29(1), 141-157","author":"Hernandez-Castro C. J.","year":"2010","unstructured":"Hernandez-Castro, C. J., & Ribagorda, A. (2010). Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. computers & security, 29(1), 141-157."},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Information Systems Security (pp. 327-342)","author":"Lorenzi D.","year":"2012","unstructured":"Lorenzi, D., Vaidya, J., Uzun, E., Sural, S., & Atluri, V. (2012, December). Attacking image based captchas using image recognition techniques. In International Conference on Information Systems Security (pp. 327-342). Berlin, Heidelberg: Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1483-4_4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASTECH.2009.5409718"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477142"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment. arXiv preprint arXiv:2006.08296","author":"Noury Z.","year":"2020","unstructured":"Noury, Z., & Rezaei, M. (2020). Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment. arXiv preprint arXiv:2006.08296."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2821096"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091522"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshop new challenges in neural computation (Vol.","author":"Stark F.","year":"2015","unstructured":"Stark, F., Haz\u0131rbas, C., Triebel, R., & Cremers, D. (2015, October). Captcha recognition with active deep learning. In Workshop new challenges in neural computation (Vol. 2015, p. 94)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09608-4"},{"key":"e_1_3_2_1_22_1","volume-title":"Development of a character CAPTCHA recognition system for the visually impaired community using deep learning. Machine vision and applications, 32(1), 29","author":"Zhang X.","year":"2021","unstructured":"Zhang, X., Liu, X., Sarkodie-Gyan, T., & Li, Z. (2021). Development of a character CAPTCHA recognition system for the visually impaired community using deep learning. Machine vision and applications, 32(1), 29."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12047"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSIT56059.2022.9932652"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HORA58378.2023.10156709"},{"key":"e_1_3_2_1_26_1","volume-title":"Soft Computing","author":"Ahmed E.","year":"2023","unstructured":"S. R. Ahmed and E. Sonu\u00e7, \u201cEvaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection,\u201d Soft Computing, Oct. 2023."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"Ankara","author":"Mahmood S. R.","year":"2023","unstructured":"N. Z. Mahmood, S. R. Ahmed, A. F. Al-Hayaly, S. Algburi and J. Rasheed, \"The Evolution of Administrative Information Systems: Assessing the Revolutionary Impact of Artificial Intelligence,\" 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-7."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISAS60782.2023.10391395"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISAS60782.2023.10391817"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISAS60782.2023.10391610"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/928\/3\/032009"},{"key":"e_1_3_2_1_32_1","unstructured":"https:\/\/datasetninja.com\/google-recaptcha-image"}],"event":{"name":"AICCONF '24: Cognitive Models and Artificial Intelligence Conference","location":"\u0130stanbul Turkiye","acronym":"AICCONF '24"},"container-title":["Proceedings of the Cognitive Models and Artificial Intelligence Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660853.3660927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660853.3660927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:45:16Z","timestamp":1755891916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660853.3660927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,25]]},"references-count":32,"alternative-id":["10.1145\/3660853.3660927","10.1145\/3660853"],"URL":"https:\/\/doi.org\/10.1145\/3660853.3660927","relation":{},"subject":[],"published":{"date-parts":[[2024,5,25]]},"assertion":[{"value":"2024-06-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}