{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T02:35:56Z","timestamp":1720492556959},"reference-count":77,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1016\/j.cose.2024.103774","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T20:43:54Z","timestamp":1708461834000},"page":"103774","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Evaluating the security of CAPTCHAs utilized on Bangladeshi websites"],"prefix":"10.1016","volume":"140","author":[{"given":"Md. Neyamul Islam","family":"Shibbir","sequence":"first","affiliation":[]},{"given":"Hasibur","family":"Rahman","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8361-4870","authenticated-orcid":false,"given":"Md Sadek","family":"Ferdous","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9902-6291","authenticated-orcid":false,"given":"Farida","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2024.103774_br0350","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"294","article-title":"CAPTCHA: using hard AI problems for security","author":"Ahn","year":"2003"},{"key":"10.1016\/j.cose.2024.103774_br0530","first-page":"292","article-title":"Ddos protection as a service: hiding behind the giants","volume":"9","author":"Al-Qudah","year":"2014","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"10.1016\/j.cose.2024.103774_br0160","series-title":"Nordic Human-Computer Interaction Conference","first-page":"1","article-title":"Does anyone dream of invisible AI? A critique of the making invisible of ai policing","author":"Alizadeh","year":"2022"},{"key":"10.1016\/j.cose.2024.103774_br0780","author":"Blurring Images"},{"key":"10.1016\/j.cose.2024.103774_br0470","doi-asserted-by":"crossref","first-page":"13333","DOI":"10.1007\/s00521-021-05957-0","article-title":"Semi-supervised deep learning approach to break common captchas","volume":"33","author":"Bostik","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.cose.2024.103774_br0560","unstructured":"Boyter, B., 2015. All About CAPTCHA's: Decoding CAPTCHA's for Fun and Profit. Leanpub."},{"key":"10.1016\/j.cose.2024.103774_br0690","first-page":"120","article-title":"Opencv","volume":"3","author":"Bradski","year":"2000","journal-title":"Dr. Dobb's J. Softw. Tools"},{"key":"10.1016\/j.cose.2024.103774_br0170","doi-asserted-by":"crossref","unstructured":"Brodi\u0107, D., Amelio, A., 2019. The captcha: Perspectives and challenges: Perspectives and challenges in artificial intelligence.","DOI":"10.1007\/978-3-030-29345-1"},{"key":"10.1016\/j.cose.2024.103774_br0120","series-title":"SAGE Business Cases, SAGE Publications: SAGE Business Cases Originals","article-title":"The soft threat: the story of the Bangladesh bank reserve heist","author":"Bukth","year":"2017"},{"key":"10.1016\/j.cose.2024.103774_br0050","series-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security","first-page":"125","article-title":"Text-based captcha strengths and weaknesses","author":"Bursztein","year":"2011"},{"key":"10.1016\/j.cose.2024.103774_br0480","series-title":"8th USENIX Workshop on Offensive Technologies","article-title":"The end is nigh: generic solving of text-based {CAPTCHAs}","volume":"vol. 14","author":"Bursztein","year":"2014"},{"key":"10.1016\/j.cose.2024.103774_br0800","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1109\/TIP.2005.852196","article-title":"Salt-and-pepper noise removal by median-type noise detectors and detail-preserving regularization","volume":"14","author":"Chan","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.cose.2024.103774_br0180","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"711","article-title":"Designing human friendly human interaction proofs (hips)","author":"Chellapilla","year":"2005"},{"key":"10.1016\/j.cose.2024.103774_br0380","series-title":"CEAS","article-title":"Computers beat humans at single character recognition in reading based human interaction proofs (hips)","author":"Chellapilla","year":"2005"},{"key":"10.1016\/j.cose.2024.103774_br0400","author":"Chesnut"},{"key":"10.1016\/j.cose.2024.103774_br0670","first-page":"69","article-title":"Captcha design and security issues","author":"Chow","year":"2019","journal-title":"Advances in Cyber Security: Principles, Techniques, and Applications"},{"key":"10.1016\/j.cose.2024.103774_br0500","first-page":"012001","article-title":"Text-Based CAPTCHAs over the Years","volume":"vol. 273","author":"Chow","year":"2017"},{"key":"10.1016\/j.cose.2024.103774_br0150","series-title":"23rd International Conference on Computer and Information Technology (ICCIT)","first-page":"7","article-title":"A study of password security factors among Bangladeshi government websites","author":"Chowdhury","year":"2020"},{"key":"10.1016\/j.cose.2024.103774_br0190","series-title":"The 3rd International Conference on Information Sciences and Interaction Sciences","first-page":"158","article-title":"Captcha design based on moving object recognition problem","author":"Cui","year":"2010"},{"key":"10.1016\/j.cose.2024.103774_br0660","series-title":"Machine Learning Proceedings 1995","first-page":"194","article-title":"Supervised and unsupervised discretization of continuous features","author":"Dougherty","year":"1995"},{"key":"10.1016\/j.cose.2024.103774_br0460","series-title":"International Conference on Intelligent Computing","first-page":"597","article-title":"Captcha recognition based on faster r-cnn","author":"Du","year":"2017"},{"key":"10.1016\/j.cose.2024.103774_br0230","unstructured":"Eikvil, L., 1993. Optical Character Recognition, Research Report, Norsk Regnesentral. Blindern."},{"key":"10.1016\/j.cose.2024.103774_br0410","series-title":"Proceedings of the Third European Workshop on System Security","first-page":"36","article-title":"The robustness of a new captcha","author":"El Ahmad","year":"2010"},{"key":"10.1016\/j.cose.2024.103774_br0210","series-title":"Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security","first-page":"111","article-title":"Blind and human: exploring more usable audio captcha designs","author":"Fanelle","year":"2020"},{"key":"10.1016\/j.cose.2024.103774_br0070","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"2623","article-title":"On the necessity of user-friendly captcha","author":"Fidas","year":"2011"},{"key":"10.1016\/j.cose.2024.103774_br0520","series-title":"Biometric alternatives to captcha: Exploring accessible interface options","author":"Foley","year":"2012"},{"key":"10.1016\/j.cose.2024.103774_br0870","author":"Foundation"},{"key":"10.1016\/j.cose.2024.103774_br0100","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"535","article-title":"Machine learning attacks against the asirra captcha","author":"Golle","year":"2008"},{"key":"10.1016\/j.cose.2024.103774_br0320","author":"Goodfellow"},{"key":"10.1016\/j.cose.2024.103774_br0580","author":"Googlebot"},{"key":"10.1016\/j.cose.2024.103774_br0600","author":"Govt. Services Bangladesh (Sebakunjo)"},{"key":"10.1016\/j.cose.2024.103774_br0640","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.cose.2018.06.007","article-title":"Invisible cappcha: a usable mechanism to distinguish between malware and humans on the mobile iot","volume":"78","author":"Guerar","year":"2018","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2024.103774_br0300","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3477142","article-title":"Gotta captcha'em all: a survey of 20 years of the human-or-computer dilemma","volume":"54","author":"Guerar","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cose.2024.103774_br0260","first-page":"141","article-title":"A survey of current research on captcha","volume":"7","author":"Hasan","year":"2016","journal-title":"Int. J. Comput. Sci. Eng. Surv."},{"key":"10.1016\/j.cose.2024.103774_br0130","article-title":"SWIFT Bank Heists and Article 4A","volume":"22","author":"Hill","year":"2018","journal-title":"Journal of Consumer and Commercial Law"},{"key":"10.1016\/j.cose.2024.103774_br0040","series-title":"Proceedings of the 14th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"Towards a framework for detecting advanced web bots","author":"Iliou","year":"2019"},{"key":"10.1016\/j.cose.2024.103774_br0020","author":"Imperva"},{"key":"10.1016\/j.cose.2024.103774_br0030","series-title":"Computer Security\u2013ESORICS 2019: 24th European Symposium on Research in Computer Security","first-page":"586","article-title":"Fingerprint surface-based detection of web bot detectors","author":"Jonker","year":"2019"},{"key":"10.1016\/j.cose.2024.103774_br0250","first-page":"6341","article-title":"Captcha and its techniques: a review","volume":"5","author":"Kaur","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"10.1016\/j.cose.2024.103774_br0310","author":"Loshin"},{"key":"10.1016\/j.cose.2024.103774_br0080","doi-asserted-by":"crossref","first-page":"e879","DOI":"10.7717\/peerj-cs.879","article-title":"A novel captcha solver framework using deep skipping convolutional neural networks","volume":"8","author":"Lu","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"10.1016\/j.cose.2024.103774_br0200","doi-asserted-by":"crossref","unstructured":"Mohamed, M., Gao, S., Saxena, N., Zhang, C., 2014. Dynamic cognitive game captcha usability and detection of streaming-based farming.","DOI":"10.14722\/usec.2014.23021"},{"key":"10.1016\/j.cose.2024.103774_br0140","series-title":"International Conference on Electrical, Computer and Communication Engineering (ECCE)","article-title":"Measuring vulnerabilities of Bangladeshi websites","author":"Moniruzzaman","year":"2019"},{"key":"10.1016\/j.cose.2024.103774_br0240","series-title":"2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings.","article-title":"Recognizing objects in adversarial clutter: breaking a visual captcha","volume":"vol. 1","author":"Mori","year":"2003"},{"key":"10.1016\/j.cose.2024.103774_br0360","series-title":"2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings.","article-title":"Recognizing objects in adversarial clutter: breaking a visual captcha","volume":"vol. 1","author":"Mori","year":"2003"},{"key":"10.1016\/j.cose.2024.103774_br0370","article-title":"Distortion Estimation Techniques in Solving Visual Captchas","volume":"vol. 2","author":"Moy","year":"2004"},{"key":"10.1016\/j.cose.2024.103774_br0590","author":"National Portal Bangladesh National Information"},{"key":"10.1016\/j.cose.2024.103774_br0720","author":"OpenCV-Python Tutorials"},{"key":"10.1016\/j.cose.2024.103774_br0730","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"Otsu","year":"1979","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"10.1016\/j.cose.2024.103774_br0340","first-page":"50","article-title":"Optical character recognition by open source ocr tool tesseract: a case study","volume":"55","author":"Patel","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.cose.2024.103774_br0010","author":"Petrosyan"},{"key":"10.1016\/j.cose.2024.103774_br0700","author":"Pillow"},{"key":"10.1016\/j.cose.2024.103774_br0270","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1504\/IJMIS.2010.037541","article-title":"Image-based face detection captcha for improved security","volume":"1","author":"Powell","year":"2010","journal-title":"International Journal of Multimedia Intelligence and Security"},{"key":"10.1016\/j.cose.2024.103774_br0450","first-page":"46","article-title":"Recognition method of text captcha using correlation and principle component analysis","volume":"9","author":"Rathoura","year":"2018","journal-title":"International Journal of Control Theory and Applications"},{"key":"10.1016\/j.cose.2024.103774_br0810","author":"Rosebrock"},{"key":"10.1016\/j.cose.2024.103774_br0710","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/S0031-3203(99)00055-2","article-title":"Adaptive document image binarization","volume":"33","author":"Sauvola","year":"2000","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.cose.2024.103774_br0330","series-title":"Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)","first-page":"629","article-title":"An overview of the tesseract ocr engine","volume":"vol. 2","author":"Smith","year":"2007"},{"key":"10.1016\/j.cose.2024.103774_br0840","series-title":"Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)","first-page":"629","article-title":"An overview of the tesseract ocr engine","volume":"vol. 2","author":"Smith","year":"2007"},{"key":"10.1016\/j.cose.2024.103774_br0770","series-title":"Computer Vision: Algorithms and Applications","author":"Szeliski","year":"2022"},{"key":"10.1016\/j.cose.2024.103774_br0880","series-title":"Proceedings of the 2019 4th International Conference on Intelligent Information Technology","first-page":"37","article-title":"Captcha: impact of website security on user experience","author":"Tanthavech","year":"2019"},{"key":"10.1016\/j.cose.2024.103774_br0280","author":"The CAPTCHA Project"},{"key":"10.1016\/j.cose.2024.103774_br0290","author":"The CAPTCHA Project"},{"key":"10.1016\/j.cose.2024.103774_br0540","series-title":"Proceedings of the 22nd International Conference on World Wide Web","first-page":"159","article-title":"Framework for evaluation of text captchas","author":"Thomas","year":"2013"},{"key":"10.1016\/j.cose.2024.103774_br0830","series-title":"International Conference on Computing, Communication & Automation","first-page":"1054","article-title":"An approach for segmentation of characters in captcha","author":"Tingre","year":"2015"},{"key":"10.1016\/j.cose.2024.103774_br0490","series-title":"2020 IEEE International Conference on Advances and Developments in Electrical and Electronics Engineering (ICADEE)","first-page":"1","article-title":"Designing a text-based captcha breaker and solver by using deep learning techniques","author":"UmaMaheswari","year":"2020"},{"key":"10.1016\/j.cose.2024.103774_br0430","first-page":"2021","article-title":"Captcha recognition method based on cnn with focal loss","author":"Wang","year":"2021","journal-title":"Complexity"},{"key":"10.1016\/j.cose.2024.103774_br0510","series-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","first-page":"599","article-title":"Let the right one in: attestation as a usable {CAPTCHA} alternative","author":"Whalen","year":"2022"},{"key":"10.1016\/j.cose.2024.103774_br0390","series-title":"Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)","first-page":"279","article-title":"Breaking visual captchas with naive pattern recognition algorithms","author":"Yan","year":"2007"},{"key":"10.1016\/j.cose.2024.103774_br0090","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"543","article-title":"A low-cost attack on a Microsoft captcha","author":"Yan","year":"2008"},{"key":"10.1016\/j.cose.2024.103774_br0060","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2009.84","article-title":"Captcha security: a case study","volume":"7","author":"Yan","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.cose.2024.103774_br0420","article-title":"Is cheap labour behind the scene?-low-cost automated attacks on yahoo captchas","author":"Yan","year":"2008","journal-title":"School of Computing Science Technical Report Series"},{"key":"10.1016\/j.cose.2024.103774_br0220","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"332","article-title":"Yet another text captcha solver: a generative adversarial network based approach","author":"Ye","year":"2018"},{"key":"10.1016\/j.cose.2024.103774_br0440","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3378446","article-title":"Using generative adversarial networks to break and protect text captchas","volume":"23","author":"Ye","year":"2020","journal-title":"ACM Transactions on Privacy and Security"},{"key":"10.1016\/j.cose.2024.103774_br0750","series-title":"Image Binarization Using Otsu Thresholding Algorithm","volume":"vol. 10","author":"Yousefi","year":"2011"},{"key":"10.1016\/j.cose.2024.103774_br0740","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.apsusc.2015.05.033","article-title":"An improved Otsu method using the weighted object variance for defect detection","volume":"349","author":"Yuan","year":"2015","journal-title":"Appl. Surf. Sci."},{"key":"10.1016\/j.cose.2024.103774_br0110","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1108\/JMLC-10-2021-0109","article-title":"Policies, instrumentalities, compliance and control: combatting money laundering in Bangladesh","volume":"26","author":"Zafarullah","year":"2023","journal-title":"J. Money Laund. Control"},{"key":"10.1016\/j.cose.2024.103774_br0550","series-title":"2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE)","first-page":"75","article-title":"A survey of research on captcha designing and breaking techniques","author":"Zhang","year":"2019"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404824000750?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404824000750?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T00:21:46Z","timestamp":1712190106000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404824000750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":77,"alternative-id":["S0167404824000750"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2024.103774","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating the security of CAPTCHAs utilized on Bangladeshi websites","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2024.103774","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103774"}}