1 |
Chandavale, A. and Sapkal, A., "An Improved Adaptive Noise Reduction for Secured CAPTCHA", in 2011 4th International Conference on Emerging Trends in Engineering and Technology (ICETET), 2011, pp. 12-17.
|
2 |
Chellapilla, K. and Simard, P. Y., "Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)", in Neural Information Processing Systems, 2004.
|
3 |
Chellapilla, K., Larson, K., Simard, P., and Czerwinski, M., "Computers beat humans at single character recognition in reading based human interaction proofs (HIPs", in In 2nd Conference on Email and Anti-Spam, 2005.
|
4 |
Chellapilla, K., Larson, K., Simard, P., and Czerwinski, M., "Designing human friendly human interaction proofs (HIPs)", 2005, p. 711.
|
5 |
El Ahmad, A. S., Yan, J., and Ng, W.-Y., "CAPTCHA Design: Color, Usability, and Security", IEEE Internet Comput., Vol. 16, No. 2, 2012, pp. 44-51.
DOI
|
6 |
Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and Shet, V., "Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks", ArXiv-13126082 Cs, 2013.
|
7 |
Hsieh, C.-C. and Wu, Z.-Y., "Anti-SIFT Images Based CAPTCHA Using Versatile Characters", in 2013 International Conference on Information Science and Applications (ICISA), 2013, pp. 1-4.
|
8 |
Li, S., Shah, S. A. H., Khan, M. A. U., Khayam, S. A., Sadeghi, A.-R., and Schmitz, R., "Breaking e-Banking CAPTCHAs", in Proceedings of the 26th Annual Computer Security Applications Conference, New York, NY, USA, 2010, pp. 171-180.
|
9 |
Lv, G., "Recognition of Multi-Fontstyle Characters Based on Convolutional Neural Network", in 2011 Fourth International Symposium on Computational Intelligence and Design (ISCID), Vol. 2, 2011, pp. 223-225.
|
10 |
Nanglae, N. and Bhattarakosol, P., "A Study of Human Bio-detection Function under Text-Based CAPTCHA System", in 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS), 2012, pp. 139-144.
|
11 |
Shirali-Shahreza, S. and Shirali-Shahreza, M. H., "Bibliography of works done on CAPTCHA", in 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, Vol. 1, 2008, pp. 205-210.
|
12 |
Shu-Guang, H., Liang, Z., Peng-Po, W., and Hong-Wei, H., "A CAPTCHA Recognition Algorithm Based on Holistic Verification", in 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, 2011, pp. 525-528.
|
13 |
Tamang, T. and Bhattarakosol, P., "Uncover impact factors of text-based CAPTCHA identification", in 2012 7th International Conference on Computing and Convertgence Technology (ICCCT), 2012, pp. 556- 560.
|
14 |
Truong, H. D., Turner, C. F., and Zou, C. C., "iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks", in 2011 IEEE International Conference on Communications (ICC), 2011, pp. 1-6.
|
15 |
Yamane, T., Statistics; an introductory analysis. New York: Harper and Row, 1967.
|
16 |
Yan, J. and El Ahmad, A. S., "A Low-cost Attack on a Microsoft Captcha", in Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, NY, USA, 2008, pp. 543-554.
|
17 |
Yan, J. and El Ahmad, A. S., "CAPTCHA Security: A Case Study", IEEE Secur. Priv., Vol. 7, No. 4, 2009, pp. 22-28.
|
18 |
Bursztein, E., Martin, M., and Mitchell, J. C., "Text-based CAPTCHA Strengths and Weaknesses", Comput. Commun. Secur., 2011.
|
19 |
Ahn, L. von, Blum, M., and Langford, J., "Telling humans and computers apart automatically", Commun. ACM, Vol. 47, No. 2, 2004, pp. 56-60.
DOI
|
20 |
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J. C., and Jurafsky, D., "How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation", in Proceedings of the 2010 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2010, pp. 399-413.
|
21 |
Chandavale, A. and Sapkal, A., "Algorithm for Secured Online Authentication Using CAPTCHA", in 2010 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 292-297.
|