{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:29:30Z","timestamp":1743013770025,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319395548"},{"type":"electronic","value":"9783319395555"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39555-5_33","type":"book-chapter","created":{"date-parts":[[2016,6,8]],"date-time":"2016-06-08T14:11:31Z","timestamp":1465395091000},"page":"611-628","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery"],"prefix":"10.1007","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Guarisco","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Spolaor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,9]]},"reference":[{"key":"33_CR1","unstructured":"AreYouAHuman - game based CAPTCHAs (2013). http:\/\/areyouahuman.com"},{"key":"33_CR2","unstructured":"Canvas (basic support) (2014). http:\/\/caniuse.com\/#feat=canvas"},{"key":"33_CR3","unstructured":"Introducing \u201cNoCAPTCHA reCAPTCHA\u201d, December 2014. http:\/\/googleonlinesecurity.blogspot.co.uk\/2014\/12\/are-you-robot-introducing-no-captcha.html"},{"key":"33_CR4","unstructured":"Usage of server-side programming languages for websites (2014). http:\/\/w3techs.com\/technologies\/overview\/programming_language\/all\/"},{"key":"33_CR5","unstructured":"recaptcha plugins, December 2015. https:\/\/developers.google.com\/recaptcha"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10032-002-0089-1","volume":"5","author":"HS Baird","year":"2003","unstructured":"Baird, H.S., Coates, A.L., Fateman, R.J.: Pessimalprint: a reverse turing test. IJDAR 5, 2\u20133 (2003)","journal-title":"IJDAR"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Baird, H.S., Riopka, T.P.: ScatterType: a reading CAPTCHA resistant to segmentation attack. In: Proceedings of EI. SPIE (2005)","DOI":"10.1117\/12.587811"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"N. Ben-Asher, J. Meyer, S. Moller, and R. Englert.: An experimental system for studying the tradeoff between usability and security. In: Proceedings of IEEE ARES (2009)","DOI":"10.1109\/ARES.2009.174"},{"key":"33_CR9","unstructured":"Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: generic solving of text-based captchas. In: Proceedings of USENIX WOOT (2014)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How good are humans at solving CAPTCHAs? a large scale evaluation. In: Proceedings of IEEE SP (2010)","DOI":"10.1109\/SP.2010.31"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of ACM CCS (2011)","DOI":"10.1145\/2046707.2046724"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Computers beat humans at single character recognition in reading based human interaction proofs (HIPs). In: Proceedings of CEAS (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Conti, M., Guarisco, C., Spolaor, R.: Captchastar! a novel CAPTCHA based on interactive shape discovery (2015). eprint arXiv:1503.00561","DOI":"10.1007\/978-3-319-39555-5_33"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"El Ahmad, A.S., Yan, J., Marshall, L.: The robustness of a new captcha. In: Proceedings of ACM EuroSys (2010)","DOI":"10.1145\/1752046.1752052"},{"key":"33_CR15","unstructured":"Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a captcha that exploits interest-aligned manual image categorization. In: Proceedings of ACM CCS (2007)"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Ferzli, R., Bazzi, R., Karam, L.J.: A captcha based on the human visual systems masking characteristics. In: Proceedings of IEEE ICME (2006)","DOI":"10.1109\/ICME.2006.262439"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: On the necessity of user-friendly CAPTCHA. In: Proceedings of ACM SIGCHI CHI (2011)","DOI":"10.1145\/1978942.1979325"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Gao, H., Yao, D., Liu, H., Liu, X., Wang, L.: A novel image based CAPTCHA using jigsaw puzzle. In: Proceedings of IEEE CSE (2010)","DOI":"10.1109\/CSE.2010.53"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Golle, P.: Machine learning attacks against the asirra CAPTCHA. In: Proceedings of ACM CCS (2008)","DOI":"10.1145\/1455770.1455838"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/S0079-6123(06)65034-6","volume":"165","author":"GE Hinton","year":"2007","unstructured":"Hinton, G.E.: To recognize shapes, first learn to generate images. Prog. Brain Res. 165, 535\u2013547 (2007)","journal-title":"Prog. Brain Res."},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Ince, I.F., Yengin, I., Salman, Y.B., Cho, H.-G., Yang, T.-C.: Designing captcha algorithm: splitting and rotating the images against ocrs. In: Proceedings of IEEE ICCIT (2008)","DOI":"10.1109\/ICCIT.2008.195"},{"key":"33_CR22","volume-title":"Organization in vision: Essays on Gestalt perception","author":"G Kanizsa","year":"1979","unstructured":"Kanizsa, G., Kanizsa, G.: Organization in vision: Essays on Gestalt perception. Praeger, New York (1979)"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Kluever K.A. Zanibbi, R.: Balancing usability and security in a video CAPTCHA. In: Proceedings of ACM SOUPS (2009)","DOI":"10.1145\/1572532.1572551"},{"key":"33_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCG.2003.1210860","volume":"23","author":"R Kosara","year":"2003","unstructured":"Kosara, R., Healey, C.G., Interrante, V., Laidlaw, D.H., Ware, C.: User studies: why, how, and when? IEEE Comput. Graphics Appl. 23, 20\u201325 (2003)","journal-title":"IEEE Comput. Graphics Appl."},{"key":"33_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/11427896_7","volume-title":"Human Interactive Proofs","author":"DP Lopresti","year":"2005","unstructured":"Lopresti, D.P.: Leveraging the CAPTCHA problem. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol. 3517, pp. 97\u2013110. Springer, Heidelberg (2005)"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Mohamed, M., Gao, S., Saxena, N., Zhang, C.: Dynamic cognitive game captcha usability and detection of streaming-based farming. In: Proceedings of the NDSS USEC (2014)","DOI":"10.14722\/usec.2014.23021"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., Kumaraguru, P., van Oorschot, P.C., Chen, W.-B.: A three-way investigation of a game-captcha: automated attacks, relay attacks and usability. In: Proceedings of ACM AsiaCCS (2014)","DOI":"10.1145\/2590296.2590298"},{"key":"33_CR28","unstructured":"Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G.M., Savage, S.: Re: Captchas understanding captcha solving services in an economic context. In: Proceedings of USENIX Security (2010)"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Nejati, H., Cheung, N.-M., Sosa, R., Koh, D.C.: DeepCAPTCHA: an image CAPTCHA based on depth perception. In: Proceedings of ACM MSC (2014)","DOI":"10.1145\/2557642.2557653"},{"key":"33_CR30","volume-title":"The design of everyday things: Revised and expanded edition","author":"DA Norman","year":"2013","unstructured":"Norman, D.A.: The design of everyday things: Revised and expanded edition. Basic books, New York (2013)"},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Okada, M., Matsuyama, S.: New captcha for smartphones and tablet pc. In: Proceedings of IEEE CCNC (2012)","DOI":"10.1109\/CCNC.2012.6181038"},{"key":"33_CR32","volume-title":"Ubiquitous computing: smart devices, environments and interactions","author":"S Poslad","year":"2011","unstructured":"Poslad, S.: Ubiquitous computing: smart devices, environments and interactions. John Wiley & Sons, New York (2011)"},{"key":"33_CR33","unstructured":"Reynaga, G., Chiasson, S.: The usability of CAPTCHAs on smartphones. In: Proceedings of SECRYPT (2013)"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M., Shirali-Shahreza, S.: Advanced collage captcha. In: Proceedings of IEEE ITNG (2008)","DOI":"10.1109\/ITNG.2008.12"},{"key":"33_CR35","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. Shirali-Shahreza, S.: Motion captcha. In: Proceedings of IEEE HSI (2008)","DOI":"10.1109\/HSI.2008.4581589"},{"key":"33_CR36","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4789-3.ch010","volume-title":"Distinguishing Human Users from Bots","author":"MH Shirali-Shahreza","year":"2014","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, S.: Distinguishing Human Users from Bots. IGI Global, Hershey (2014)"},{"key":"33_CR37","doi-asserted-by":"crossref","unstructured":"Thomas, V., Kaur, K.: Cursor CAPTCHA implementing CAPTCHA using mouse cursor. In: Proceedings of IEEE WOCN (2013)","DOI":"10.1109\/WOCN.2013.6616188"},{"key":"33_CR38","doi-asserted-by":"crossref","unstructured":"Truong, H.D., Turner, C.F., Zou, C.C.: iCAPTCHA: the next generation of CAPTCHA designed to defend against 3rd party human attacks. In: Proceedings of IEEE ICC (2011)","DOI":"10.1109\/icc.2011.5963009"},{"key":"33_CR39","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L Ahn","year":"2004","unstructured":"Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47, 56\u201360 (2004)","journal-title":"Commun. ACM"},{"key":"33_CR40","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: A low-cost attack on a microsoft CAPTCHA. In: Proceedings of ACM CCS (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"33_CR41","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of ACM SOUPS (2008)","DOI":"10.1145\/1408664.1408671"},{"key":"33_CR42","doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K.: Attacks and design of image recognition CAPTCHAs. In: Proceedings of ACM CCS (2010)","DOI":"10.1145\/1866307.1866329"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39555-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T06:26:56Z","timestamp":1656656816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-39555-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319395548","9783319395555"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39555-5_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}