{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:42:00Z","timestamp":1770226920831,"version":"3.49.0"},"reference-count":33,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062729","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T03:00:41Z","timestamp":1739329241000},"page":"115-136","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel CAPTCHA Recognition System Based on Refined Visual Attention"],"prefix":"10.32604","volume":"83","author":[{"given":"Zaid","family":"Derea","sequence":"first","affiliation":[]},{"given":"Beiji","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Kui","sequence":"additional","affiliation":[]},{"given":"Monir","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Alaa","family":"Thobhani","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Abdussalam","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2023 International Conference on Emerging Techniques in Computational Intelligence (ICETCI)","first-page":"244","article-title":"CAPTCHA recognition and analysis using custom based CNN model-capsecure","author":"Sinha","year":"2023"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"11661","DOI":"10.1007\/s00500-023-07844-3","article-title":"An efficient technique for breaking of coloured Hindi CAPTCHA","volume":"27","author":"Kumar","year":"2023","journal-title":"Soft Comput"},{"key":"ref3","first-page":"1","article-title":"An experimental investigation of text-based CAPTCHA attacks and their robustness","volume":"55","author":"Wang","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref4","series-title":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","first-page":"673","article-title":"Recognition based segmentation of connected characters in text based CAPTCHAs","volume":"2656","author":"Hussain","year":"2016"},{"key":"ref5","series-title":"In: Biham E (ed.), Advances in Cryptology\u2013EUROCRYPT 2003. Lecture Notes in Computer Science.","first-page":"294","volume":"2656","author":"Von Ahn","year":"2003"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/966389.966390","article-title":"Telling humans and computers apart automatically","volume":"47","author":"Von Ahn","year":"2004","journal-title":"Commun ACM"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1007\/s11831-021-09608-4","article-title":"A systematic survey on CAPTCHA recognition: types, creation and breaking techniques","volume":"29","author":"Kumar","year":"2022","journal-title":"Arch Comput Methods Eng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2522","DOI":"10.1109\/TIFS.2018.2821096","article-title":"Research on deep learning techniques in breaking text-based captchas and designing image-based captcha","volume":"13","author":"Tang","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref9","first-page":"2953","article-title":"A security analysis of captchas with large character sets","volume":"18","author":"Wang","year":"2020","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref10","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"332","article-title":"Yet another text captcha solver: a generative adversarial network based approach","author":"Ye","year":"2018"},{"key":"ref11","series-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security","first-page":"1075","article-title":"The robustness of hollow CAPTCHAs","author":"Gao","year":"2013"},{"key":"ref12","series-title":"2019 IEEE International Conference on Image Processing (ICIP)","first-page":"779","article-title":"Llrnet: a multiscale subband learning approach for low light image restoration","author":"Malik","year":"2019"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1109\/TMM.2019.2938340","article-title":"A flexible deep CNN framework for image restoration","volume":"22","author":"Jin","year":"2019","journal-title":"IEEE Trans Multimedia"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2305","DOI":"10.1109\/TPAMI.2018.2873610","article-title":"Denoising prior driven deep neural network for image restoration","volume":"41","author":"Dong","year":"2018","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref15","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"7263","article-title":"YOLO9000: better, faster, stronger","author":"Redmon","year":"2017"},{"key":"ref16","series-title":"2018 11th International Symposium on Computational Intelligence and Design (ISCID)","first-page":"119","article-title":"An improved faster R-CNN for object detection","volume":"2","author":"Liu","year":"2018"},{"key":"ref17","series-title":"Signal and Information Processing, Networking and Computers: Proceedings of the 4th International Conference on Signal and Information Processing, Networking and Computers (ICSINC)","first-page":"58","article-title":"License plate segmentation method using deep learning techniques","author":"Abdussalam","year":"2019"},{"key":"ref18","series-title":"Communications, Signal Processing, and Systems: Proceedings of the 2018 CSPS Volume III: Systems","first-page":"121","article-title":"Robust model for chinese license plate character recognition using deep learning techniques","author":"Abdussalam","year":"2020"},{"key":"ref19","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6077","article-title":"Bottom-up and top-down attention for image captioning and visual question answering","author":"Anderson","year":"2018"},{"key":"ref20","first-page":"3447","article-title":"RVAIC: Refined visual attention for improved image captioning","volume":"46","author":"Al-Qatf","year":"2024","journal-title":"J Intell Fuzzy Syst"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"107593","DOI":"10.1016\/j.compeleceng.2021.107593","article-title":"De-CAPTCHA: a novel DFS based approach to solve CAPTCHA schemes","volume":"97","author":"Atri","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref22","series-title":"2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition","article-title":"Recognizing objects in adversarial clutter: breaking a visual CAPTCHA","author":"Mori","year":"2003"},{"key":"ref23","article-title":"Using machine learning to break visual human interaction proofs (HIPs)","volume":"17","author":"Chellapilla","year":"2004","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref24","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"543","article-title":"A low-cost attack on a microsoft CAPTCHA","author":"Yan","year":"2008"},{"key":"ref25","series-title":"Proceedings of the Third European Workshop on System Security","first-page":"36","article-title":"The robustness of a new CAPTCHA","author":"El Ahmad","year":"2010"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1109\/TIFS.2017.2682704","article-title":"Research on the security of microsoft\u2019s two-layer captcha","volume":"12","author":"Gao","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1522","DOI":"10.3390\/electronics9091522","article-title":"CAPTCHA recognition using deep learning with attached binary images","volume":"9","author":"Thobhani","year":"2020","journal-title":"Electronics"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"9487","DOI":"10.3390\/s23239487","article-title":"Deep learning based CAPTCHA recognition network with grouping strategy","volume":"23","author":"Derea","year":"2023","journal-title":"Sensors"},{"key":"ref29","unstructured":"Khatavkar V, Velankar M, Petkar S. Segmentation-free Connectionist Temporal Classification loss based OCR Model for Text Captcha Classification. arXiv: 240205417. 2024."},{"key":"ref30","first-page":"103711","article-title":"The robustness of behavior-verification-based slider CAPTCHAs","volume":"81","author":"Chang","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"4013","DOI":"10.1109\/TIP.2020.2969330","article-title":"Image captioning with end-to-end attribute detection and subsequent attributes prediction","volume":"29","author":"Huang","year":"2020","journal-title":"IEEE Trans Image Process"},{"key":"ref32","first-page":"5989","article-title":"Image captioning with novel topics guidance and retrieval-based topics re-weighting","volume":"25","author":"Al-Qatf","year":"2022","journal-title":"IEEE Trans Multimedia"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s00530-023-01249-w","article-title":"GVA: Guided visual attention approach for automatic image caption generation","volume":"30","author":"Hossen","year":"2024","journal-title":"Multimed Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_62729\/TSP_CMC_62729.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:41:18Z","timestamp":1763102478000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062729","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}