{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T03:10:09Z","timestamp":1748488209520,"version":"3.41.0"},"reference-count":54,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In their propose technique the authors tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google's reCAPTCHA and Microsoft's CAPTCHA in terms of usability and security and found the authors' system capable of deploying largely over internet.<\/p>","DOI":"10.4018\/ijssci.2014100101","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T19:40:52Z","timestamp":1436298052000},"page":"1-19","source":"Crossref","is-referenced-by-count":2,"title":["Human Cognition in Automated Truing Test Design"],"prefix":"10.4018","volume":"6","author":[{"given":"Mir Tafseer","family":"Nayeem","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering (CSE), Ahsanullah University of Science and Technology (AUST), Dhaka, Bangladesh"}]},{"given":"Mamunur Rashid","family":"Akand","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, Alberta, Canada"}]},{"given":"Nazmus","family":"Sakib","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering (CSE), Ahsanullah University of Science and Technology (AUST), Dhaka, Bangladesh"}]},{"given":"Wasi Ul","family":"Kabir","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering (CSE), Ahsanullah University of Science and Technology (AUST), Dhaka, Bangladesh"}]}],"member":"2432","reference":[{"author":"G.Accounts","key":"ijssci.2014100101-0"},{"key":"ijssci.2014100101-1","doi-asserted-by":"crossref","unstructured":"Almazayd, A. S. Ahmed, Y Kouchay, \u201cMulti Modal CAPTCHA: A User Verification Scheme\u201d. Presented at Int Conf on Information Science and Application, Korea, 2011","DOI":"10.1109\/ICISA.2011.5772421"},{"key":"ijssci.2014100101-2","unstructured":"Audio and visual captcha. http:\/\/www.nswardh.com\/shout\/"},{"key":"ijssci.2014100101-3","unstructured":"Online Available: http:\/\/www.captcha.net\/captchas\/gimpy\/"},{"key":"ijssci.2014100101-4","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Cognitive_psychology"},{"key":"ijssci.2014100101-5","first-page":"1829","author":"J. P.Bigham","year":"2009","journal-title":"Evaluating existing audio captchas and an interface optimized for non-visual use. international conference on Human factors in computing systems, CHI \u201809"},{"key":"ijssci.2014100101-6","unstructured":"Blum, M., von Ahn, L. A., & Langford, J. \u201cThe CAPTCHA Project, Completely Automatic Public Turing Test to Tell Computers and Humans Apart,\u201d Nov. 2000, http:\/\/www.captcha.net, Dept. of Computer Science, Carnegie-Mellon Univ."},{"key":"ijssci.2014100101-7","unstructured":"Breaking text captcha."},{"key":"ijssci.2014100101-8","unstructured":"http:\/\/www.blackhat-seo.com\/2008\/how-to-break-captchas\/"},{"key":"ijssci.2014100101-9","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135827"},{"key":"ijssci.2014100101-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9"},{"key":"ijssci.2014100101-11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"ijssci.2014100101-12","first-page":"1","article-title":"ITube, You Tube, Everybody Tubes: Analyzing the World\u2018sLargest User Generated Content Video System.","author":"M.Cha","year":"2007","journal-title":"Proc. IMC2007"},{"key":"ijssci.2014100101-13","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2003.1250195"},{"key":"ijssci.2014100101-14","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1145\/1054972.1055070","article-title":"Designinghuman friendly human interaction proofs (hips).","author":"K.Chellapilla","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems, CHI\u201805"},{"key":"ijssci.2014100101-15","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., & Simard, P. Using machine learning to break visualhuman interaction proofs (hips). In In Advances in Neural Information Processing Systems, pages 265\u2013272, 2005.","DOI":"10.1145\/1054972.1055070"},{"key":"ijssci.2014100101-16","doi-asserted-by":"crossref","unstructured":"Chew, M., & Baird, H. S. \u2014BaffleText, a Human Interaction Proof\u2016, In Proceedings of the 10th SPIE\/IS&T Document Recognition and Retrieval Conference (DRR'03), Santa Clara, CA, USA, 2003, pp. 305-316.","DOI":"10.1117\/12.479682"},{"key":"ijssci.2014100101-17","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-540-30144-8_23","article-title":"Image recognition captchas.","author":"M.Chew","year":"2004","journal-title":"Proceedings of the 7th International Information Security Conference (ISC)"},{"key":"ijssci.2014100101-18","doi-asserted-by":"crossref","unstructured":"Cui, J.-S., Mei, J.-T., Wang, X., Zhang, D., & Zhang, W.-Z. A CAPTCHA Implementation Based on 3D Animation. In: International Conference on Multimedia Information Networking and Security, MINES, vol. 2, pp. 179\u2013182 (2009)","DOI":"10.1109\/MINES.2009.298"},{"key":"ijssci.2014100101-19","unstructured":"http:\/\/morphadorner.northwestern.edu\/morphadorner\/postagger\/"},{"key":"ijssci.2014100101-20","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101218"},{"key":"ijssci.2014100101-21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.33"},{"key":"ijssci.2014100101-22","doi-asserted-by":"publisher","DOI":"10.1145\/1752046.1752052"},{"key":"ijssci.2014100101-23","first-page":"366","article-title":"Asirra: A Captcha that exploits interest aligned manual image categorization.","author":"J.Elson","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and communications security, CCS \u201807"},{"key":"ijssci.2014100101-24"},{"key":"ijssci.2014100101-25","first-page":"2623","article-title":"On the Necessity of Userfriendly CAPTCHA.","author":"C.Fidas","year":"2011","journal-title":"Proc. CHI 2011"},{"key":"ijssci.2014100101-26","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2010.65"},{"key":"ijssci.2014100101-27","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455838"},{"key":"ijssci.2014100101-28"},{"key":"ijssci.2014100101-29","unstructured":"http:\/\/recaptcha.net\/"},{"key":"ijssci.2014100101-30","doi-asserted-by":"crossref","unstructured":"Kluever, K. A., & Zanibbi, R. Balancing Usability and Security in a Video CAPTCHA. In Proc. SOUPS 2009, ACM Press (2009), Article 14, 11 pages. English Language taken from wikipedia and available at http:\/\/www.en.wikipedia.com\/English_Language","DOI":"10.1145\/1572532.1572551"},{"key":"ijssci.2014100101-31","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755736"},{"key":"ijssci.2014100101-32","article-title":"Recognizing objects in adversarial clutter\u2014breaking a visual captcha.","author":"G.Mori","year":"2003","journal-title":"Proceedings of the Conference on Computer Vision and Pattern Recognition"},{"key":"ijssci.2014100101-33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.33"},{"key":"ijssci.2014100101-34","unstructured":"Nielsen, J. Usability 101: Introduction to Usability, 2003. Available at http:\/\/www.useit.com\/alertbox\/20030825.html"},{"key":"ijssci.2014100101-35","doi-asserted-by":"publisher","DOI":"10.1080\/0144341910110301"},{"key":"ijssci.2014100101-36","article-title":"Dix, A. Exploiting Context in HCI Design for Mobile Systems.","author":"T.Rodden","year":"1998","journal-title":"Workshop on Human Computer Interaction with Mobile Devices"},{"key":"ijssci.2014100101-37","unstructured":"School of Computer Science. (2009, Dec.). Gimpy. Carnegie Mellon."},{"key":"ijssci.2014100101-38"},{"key":"ijssci.2014100101-39","doi-asserted-by":"crossref","unstructured":"Moin Mahmud Tanvee, Mir Tafseer Nayeem, Md. Mahmudul Hasan Rafee \u2014 Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services\u2016, International Journal of Video & Image Processing and Network Security IJVIPNS \/ IJENSvol. 11, issue 5, October, 2011","DOI":"10.1016\/S1353-4858(11)70096-4"},{"key":"ijssci.2014100101-40","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ijssci.2014100101-41","doi-asserted-by":"publisher","DOI":"10.1145\/1178618.1178619"},{"key":"ijssci.2014100101-42","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"ijssci.2014100101-43","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2002.1039280"},{"key":"ijssci.2014100101-44","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2006.365666"},{"key":"ijssci.2014100101-45","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2007010101"},{"key":"ijssci.2014100101-46","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2007070105"},{"key":"ijssci.2014100101-47","doi-asserted-by":"publisher","DOI":"10.4018\/jssci.2009070101"},{"key":"ijssci.2014100101-48","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2010010101"},{"key":"ijssci.2014100101-49","unstructured":"Jeff Yan, Ahmad Salah El Ahamd. \u201cUsability OF CAPTCHAs Or usability issues in CAPTCHA design\u201d"},{"key":"ijssci.2014100101-50","unstructured":"http:\/\/captcha-bypass.com\/"},{"key":"ijssci.2014100101-51","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"ijssci.2014100101-52","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866329"},{"key":"ijssci.2014100101-53","unstructured":"http:\/\/www.spellchecker.net\/spellcheck\/"}],"container-title":["International Journal of Software Science and Computational Intelligence"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=133255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T02:28:15Z","timestamp":1748485695000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijssci.2014100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijssci.2014100101","relation":{},"ISSN":["1942-9045","1942-9037"],"issn-type":[{"type":"print","value":"1942-9045"},{"type":"electronic","value":"1942-9037"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}