{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:52:18Z","timestamp":1725677538867},"reference-count":224,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602349","61572381"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1016\/j.neucom.2019.08.109","type":"journal-article","created":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T15:38:02Z","timestamp":1589297882000},"page":"292-307","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["A survey of CAPTCHA technologies to distinguish between human and computer"],"prefix":"10.1016","volume":"408","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0748-3669","authenticated-orcid":false,"given":"Xin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2019.08.109_bib0001","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/966389.966390","article-title":"Telling humans and computers apart automatically","author":"Von Ahn","year":"2004","journal-title":"Commun. ACM"},{"key":"10.1016\/j.neucom.2019.08.109_bib0002","series-title":"Advances in Cryptology\u2014EUROCRYPT","first-page":"294","article-title":"CAPTCHA: Using hard AI problems for security","author":"Von Ahn","year":"2003"},{"key":"10.1016\/j.neucom.2019.08.109_bib0003","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/s10032-002-0089-1","article-title":"PessimalPrint: a reverse Turing test","author":"Baird","year":"2003","journal-title":"Int. J. Doc. Anal. Recogn."},{"key":"10.1016\/j.neucom.2019.08.109_bib0004","first-page":"1","article-title":"A survey and analysis of current CAPTCHA approaches","author":"Roshanbin","year":"2013","journal-title":"J. Eng."},{"key":"10.1016\/j.neucom.2019.08.109_bib0005","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.neucom.2013.01.009","article-title":"Optimized projections for sparse representation based classification","author":"Lu","year":"2013","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0006","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1016\/j.neucom.2006.02.006","article-title":"Feature selection in independent component subspace for microarray data classification","author":"Zheng","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0007","doi-asserted-by":"crossref","first-page":"2557","DOI":"10.1162\/neco.2007.19.9.2557","article-title":"MISEP method for Post-Nonlinear Blind Source Separation","author":"Zheng","year":"2007","journal-title":"Neural Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0008","first-page":"1","article-title":"Linear and nonlinear feedforward neural network classifiers: A comprehensive understanding","author":"Huang","year":"1999","journal-title":"J. Intell. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0009","doi-asserted-by":"crossref","first-page":"2293","DOI":"10.1016\/j.patcog.2005.11.012","article-title":"Classifying protein sequences using hydropathy blocks","author":"Huang","year":"2006","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.neucom.2019.08.109_bib0010","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.compbiomed.2008.02.007","article-title":"Cancer classification using rotation forest","author":"Liu","year":"2008","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.neucom.2019.08.109_bib0011","unstructured":"M. T. Banday and N. A. Shah, \"A study of captchas for securing web services,\" arXiv preprint arXiv:1112.5605, 2011."},{"key":"10.1016\/j.neucom.2019.08.109_bib0012","series-title":"Proceedings of the 2nd International Conference on Adaptive Science & Technology ICAST","first-page":"244","article-title":"Checking Internet masquerading using multiple CAPTCHA challenge-response systems","author":"Longe","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0013","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2010.275","article-title":"Captcha robustness: A security engineering perspective","author":"Yan","year":"2011","journal-title":"Computer"},{"key":"10.1016\/j.neucom.2019.08.109_bib0014","doi-asserted-by":"crossref","first-page":"36","DOI":"10.9790\/0661-0863642","article-title":"A review of bot protection using CAPTCHA for web security","author":"Saini","year":"2013","journal-title":"IOSR J. Comput. Eng."},{"key":"10.1016\/j.neucom.2019.08.109_bib0015","first-page":"29","article-title":"Attitudes towards CAPTCHA: A survey of Thai internet users","author":"Tangmanee","year":"2013","journal-title":"J. Global Bus. Manag."},{"key":"10.1016\/j.neucom.2019.08.109_bib0016","unstructured":"C. J. Hern\u00e1ndez-Castro, D. F. Barrero, and S. Li, An oracle-based attack on CAPTCHAs protected against oracle attacks, arXiv preprint arXiv:1702.03815, 2017."},{"key":"10.1016\/j.neucom.2019.08.109_bib0017","series-title":"Proceedings of the First International Workshop on Knowledge Discovery and Data Mining WKDD","first-page":"558","article-title":"Filtering short message spam of group sending using CAPTCHA","author":"He","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0018","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1016\/j.neucom.2005.06.008","article-title":"Nonnegative independent component analysis based on minimizing mutual information technique","author":"Zheng","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0019","series-title":"The Study of Data Mining Methods for Gene Expression Profiles","author":"Huang","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0020","doi-asserted-by":"crossref","first-page":"2369","DOI":"10.1016\/j.neucom.2006.02.013","article-title":"Improved extreme learning machine for function approximation by encoding a priori information","author":"Han","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0021","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s00521-007-0135-5","article-title":"A new constrained learning algorithm for function approximation by encoding a priori information into feedforward neural networks","author":"Han","year":"2008","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.neucom.2019.08.109_bib0022","series-title":"Proceedings of the International Workshop on Security Protocols","first-page":"190","article-title":"Bot, cyborg and automated Turing test","author":"Yan","year":"2006"},{"key":"10.1016\/j.neucom.2019.08.109_bib0023","series-title":"Proceedings of the International Workshop on Document Analysis Systems","first-page":"507","article-title":"Human interactive proofs and document image analysis","author":"Baird","year":"2002"},{"key":"10.1016\/j.neucom.2019.08.109_bib0024","series-title":"Proceedings of the IFIP International Information Security Conference","first-page":"25","article-title":"Audio CAPTCHA for SIP-based VoIP","author":"Soupionis","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0025","series-title":"Proceedings of the 4th Symposium on Usable Privacy and Security","first-page":"44","article-title":"Usability of CAPTCHAs or usability issues in CAPTCHA design","author":"Yan","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0027","series-title":"Human Interactive Proofs","first-page":"1","article-title":"Building segmentation based human-friendly human interaction proofs (HIPs)","author":"Chellapilla","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0028","first-page":"2242","article-title":"Survey of different types of CAPTCHA","author":"Singh","year":"2014","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"10.1016\/j.neucom.2019.08.109_bib0029","series-title":"Proceedings of the Computer Science and Information Technology, 2008. IMCSIT 2008. International Multiconference on","first-page":"325","article-title":"SemCAPTCHA\u2014user-friendly alternative for OCR-based CAPTCHA systems","author":"Lupkowski","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0030","series-title":"Proceedings of the ACM SIGCHI International Conference on Advances in Computer Entertainment Technology","first-page":"262","article-title":"Keeping bots out of online games","author":"Golle","year":"2005"},{"issue":"3","key":"10.1016\/j.neucom.2019.08.109_bib0031","first-page":"469","article-title":"A Survey of CAPTCHA Technology","volume":"49","author":"Li","year":"2012","journal-title":"J. Comput. Res. Devel."},{"key":"10.1016\/j.neucom.2019.08.109_bib0034","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1016\/j.neucom.2005.07.004","article-title":"Noise removal using a novel non-negative sparse coding shrinkage technique","author":"Shang","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0035","series-title":"Proceedings of the Advances in Neural Information Processing Systems","first-page":"265","article-title":"Using machine learning to break visual human interaction proofs (hips)","author":"Simard","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0036","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"543","article-title":"A Low-cost Attack on a Microsoft CAPTCHA","author":"Yan","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0037","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.dsp.2004.12.004","article-title":"Extracting nonlinear features for multispectral images by FCMC and KPCA","author":"Sun","year":"2005","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.neucom.2019.08.109_bib0038","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/LGRS.2005.844169","article-title":"Using FCMC, FVS and PCA techniques for feature extraction of multispectral images","author":"Sun","year":"2005","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"10.1016\/j.neucom.2019.08.109_bib0039","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1016\/j.apm.2006.04.014","article-title":"A mended hybrid learning algorithm for radial basis function neural networks to improve generalization capability","author":"Zhao","year":"2007","journal-title":"Appl. Math. Modell."},{"key":"10.1016\/j.neucom.2019.08.109_bib0040","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.neucom.2007.07.010","article-title":"Palmprint recognition with 2DPCA+PCA based on modular neural networks","author":"Zhao","year":"2007","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0041","series-title":"Proceedings of the Computer Security Applications Conference ACSAC Twenty-Third Annual","first-page":"279","article-title":"Breaking visual captchas with naive pattern recognition algorithms","author":"Yan","year":"2007"},{"key":"10.1016\/j.neucom.2019.08.109_bib0042","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2009.84","article-title":"CAPTCHA security: a case study","author":"Yan","year":"2009","journal-title":"IEEE Secur. Privacy"},{"key":"10.1016\/j.neucom.2019.08.109_bib0043","series-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","first-page":"535","article-title":"Machine learning attacks against the Asirra CAPTCHA","author":"Golle","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0044","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"2623","article-title":"On the necessity of user-friendly CAPTCHA","author":"Fidas","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0045","series-title":"Proceedings of the International Conference on Information Security","first-page":"257","article-title":"Towards human interactive proofs in the text-domain","author":"Bergmair","year":"2004"},{"key":"10.1016\/j.neucom.2019.08.109_bib0046","unstructured":"K. R. Soumya and R. M. Abraham, A Survey on Different CAPTCHA Techniques, 2014."},{"key":"10.1016\/j.neucom.2019.08.109_bib0047","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.displa.2010.12.004","article-title":"Usability study of text-based CAPTCHAs","author":"Lee","year":"2011","journal-title":"Displays"},{"key":"10.1016\/j.neucom.2019.08.109_bib0048","series-title":"Proceedings of the First Workshop on Human Interactive Proofs","first-page":"8","article-title":"Text-based CAPTCHA algorithms","author":"Godfrey","year":"2002"},{"key":"10.1016\/j.neucom.2019.08.109_bib0049","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.procs.2013.09.309","article-title":"CaptchAll: an improvement on the modern text-based CAPTCHA","author":"Obimbo","year":"2013","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.neucom.2019.08.109_bib0050","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1016\/j.neucom.2005.06.010","article-title":"Optimal selection of time lags for temporal blind source separation based on genetic algorithm","author":"Sun","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0051","doi-asserted-by":"crossref","DOI":"10.14445\/22315381\/IJETT-V22P251","article-title":"Survey of Text CAPTCHA Techniques and Attacks","author":"Sharma","year":"2015","journal-title":"Int. J. Eng. Trends. Technol."},{"key":"10.1016\/j.neucom.2019.08.109_bib0052","series-title":"Proceedings of the 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET)","first-page":"258","article-title":"Algorithm to break visual CAPTCHA","author":"Chandavale","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0053","series-title":"Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET)","first-page":"292","article-title":"Algorithm for secured online authentication using CAPTCHA","author":"Chandavale","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0054","series-title":"Proceedings of the Second International Web Document Analysis Workshop","article-title":"Protecting Websites with Reading-Based CAPTCHAs","author":"Baird","year":"2003"},{"key":"10.1016\/j.neucom.2019.08.109_bib0055","article-title":"CAPTCHA: Attacks and Weaknesses against OCR technology","author":"Azad","year":"2013","journal-title":"Global J. Comput. Sci. Technol."},{"key":"10.1016\/j.neucom.2019.08.109_bib0056","series-title":"Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","first-page":"121","article-title":"A case study of text-based CAPTCHA attacks","author":"Ling-Zi","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0057","series-title":"The CAPTCHA project, Completely Automatic Public Turing test to Tell Computers and Humans apart,","author":"Blum","year":"2000"},{"key":"10.1016\/j.neucom.2019.08.109_bib0058","series-title":"Analysis of reCAPTCHA effectiveness","author":"Beede","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0059","series-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition","article-title":"Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA","author":"Mori","year":"2003"},{"key":"10.1016\/j.neucom.2019.08.109_bib0060","series-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR","article-title":"Distortion estimation techniques in solving visual CAPTCHAs","author":"Moy","year":"2004"},{"key":"10.1016\/j.neucom.2019.08.109_bib0061","doi-asserted-by":"crossref","first-page":"3995","DOI":"10.1002\/sec.1316","article-title":"Breaking down Captcha using edge corners and fuzzy logic segmentation\/recognition technique","author":"Nachar","year":"2015","journal-title":"Security and Communication Networks"},{"key":"10.1016\/j.neucom.2019.08.109_bib0062","series-title":"Human Interactive Proofs","first-page":"82","article-title":"CAPTCHA generation as a web service","author":"Converse","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0063","series-title":"Proceedings of the Electronic Imaging","first-page":"305","article-title":"Baffletext: A human interactive proof","author":"Chew","year":"2003"},{"key":"10.1016\/j.neucom.2019.08.109_bib0064","series-title":"Proceedings of the 4th Symposium on Usable Privacy and Security","first-page":"1","article-title":"Towards a universally usable CAPTCHA","author":"Sauer","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0065","series-title":"Proceedings of the International Conference on Information Science and Applications (ICISA)","first-page":"1","article-title":"Multi-modal captcha: A user verification scheme","author":"Almazyad","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0066","series-title":"Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT)","first-page":"67","article-title":"A new architecture for the generation of picture based CAPTCHA","author":"Raj","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0067","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MITP.2005.37","article-title":"Is it human or computer? Defending e-commerce with captchas","author":"Pope","year":"2005","journal-title":"IT Profess."},{"key":"10.1016\/j.neucom.2019.08.109_bib0068","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1126\/science.1160379","article-title":"recaptcha: Human-based character recognition via web security measures","author":"Von Ahn","year":"2008","journal-title":"Science"},{"key":"10.1016\/j.neucom.2019.08.109_bib0069","series-title":"Human Interactive Proofs","first-page":"66","article-title":"Collaborative filtering captchas","author":"Chew","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0070","series-title":"Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA)","first-page":"430","article-title":"CAPTCHA using strangeness in machine translation","author":"Yamamoto","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0071","unstructured":"J. Wilkins, \"Strong captcha guidelines v1. 2,\" http:\/\/bitland.net\/captcha.pdf. 2010, p. 8."},{"key":"10.1016\/j.neucom.2019.08.109_bib0072","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.patcog.2014.09.006","article-title":"Breaking text-based CAPTCHAs with variable word and character orientation","author":"Starostenko","year":"2015","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.neucom.2019.08.109_bib0073","series-title":"Proceedings of the CoRR","article-title":"Multi-digit number recognition from street view imagery using deep convolutional neural networks","author":"Goodfellow","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0074","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/j.neucom.2006.05.003","article-title":"A novel full structure optimization algorithm for radial basis probabilistic neural networks","author":"Du","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0075","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1191\/0142331206tim176oa","article-title":"Computer-aided plant species identification (CAPSI) based on leaf shape matching technique","author":"Du","year":"2006","journal-title":"Trans. Inst. Meas. Control"},{"key":"10.1016\/j.neucom.2019.08.109_bib0076","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1016\/j.neucom.2006.10.026","article-title":"Shape recognition based on neural networks trained by differential evolution algorithm","author":"Du","year":"2007","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0077","series-title":"Proceedings of the Ninth International Conference on Digital Image Processing (ICDIP 2017)","article-title":"CNN for breaking text-based CAPTCHA with noise","author":"Liu","year":"2017"},{"key":"10.1016\/j.neucom.2019.08.109_bib0078","series-title":"Proceedings of the International Conference on Knowledge Science, Engineering and Management","first-page":"209","article-title":"Recognizing Character-Matching CAPTCHA Using Convolutional Neural Networks with Triple Loss","author":"Hu","year":"2018"},{"key":"10.1016\/j.neucom.2019.08.109_bib0079","doi-asserted-by":"crossref","unstructured":"J. Bentley and C. Mallows, CAPTCHA challenge strings: Problems and improvements, in Proceedings of the Document Recognition and Retrieval XIII. 2006, p. 60670H: International Society for Optics and Photonics.","DOI":"10.1117\/12.650644"},{"key":"10.1016\/j.neucom.2019.08.109_bib0080","series-title":"Proceedings of the SIGCHI Conference on Human factors in Computing Systems","first-page":"711","article-title":"Designing human friendly human interaction proofs (HIPs)","author":"Chellapilla","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0081","series-title":"Proceedings of the Conference on Human System Interactions","first-page":"247","article-title":"Highlighting captcha","author":"Shirali-Shahreza","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0082","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.cose.2013.05.003","article-title":"Defeating line-noise CAPTCHAs with multiple quadratic snakes","author":"Nakaguro","year":"2013","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0083","series-title":"Proceedings of the 26th Annual Computer Security Applications Conference","first-page":"171","article-title":"Breaking e-banking CAPTCHAs","author":"Li","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0084","series-title":"Proceedings of the 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA)","first-page":"796","article-title":"A novel dynamic CAPTCHA based on inverted colors","author":"Men","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0085","series-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security","first-page":"1075","article-title":"The robustness of hollow CAPTCHAs","author":"Gao","year":"2013"},{"issue":"12","key":"10.1016\/j.neucom.2019.08.109_bib0086","doi-asserted-by":"crossref","first-page":"3365","DOI":"10.1016\/j.patcog.2008.12.018","article-title":"Synthetic handwritten captchas","volume":"42","author":"Thomas","year":"2009","journal-title":"Pattern Recognit."},{"issue":"1","key":"10.1016\/j.neucom.2019.08.109_bib0087","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10032-009-0102-z","article-title":"Generation and use of handwritten CAPTCHAs","volume":"13","author":"Rusu","year":"2010","journal-title":"Int. J. Document Anal. Recognit. (IJDAR)"},{"key":"10.1016\/j.neucom.2019.08.109_bib0088","series-title":"Systematic Theory of Neural Networks for Pattern Recognition","author":"Huang","year":"1996"},{"key":"10.1016\/j.neucom.2019.08.109_bib0089","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1142\/S0218001499000604","article-title":"Radial basis probabilistic neural networks: Model and application","author":"Huang","year":"1999","journal-title":"Int. J. Pattern Recognit Artif Intell."},{"key":"10.1016\/j.neucom.2019.08.109_bib0090","doi-asserted-by":"crossref","first-page":"2099","DOI":"10.1109\/TNN.2008.2004370","article-title":"A constructive hybrid structure optimization methodology for radial basis probabilistic neural networks","author":"D.S.Huang","year":"2008","journal-title":"IEEE Trans. Neural Netw."},{"key":"10.1016\/j.neucom.2019.08.109_bib0091","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1109\/TNN.2004.824424","article-title":"A constructive approach for finding arbitrary roots of polynomials by neural networks","author":"Huang","year":"2004","journal-title":"IEEE Trans. Neural Netw."},{"key":"10.1016\/j.neucom.2019.08.109_bib0092","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TNN.2005.844912","article-title":"Zeroing polynomials using modified constrained neural network approach","author":"Huang","year":"2005","journal-title":"IEEE Trans. Neural Netw."},{"key":"10.1016\/j.neucom.2019.08.109_bib0093","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/TNN.2007.895910","article-title":"A new constrained independent component analysis method","author":"Huang","year":"2007","journal-title":"IEEE Trans. Neural Netw."},{"key":"10.1016\/j.neucom.2019.08.109_bib0094","first-page":"461","article-title":"Determining the centers of radial basis probabilistic neural networks by recursive orthogonal least square algorithms","author":"Huang","year":"2005","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0097","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1109\/TCYB.2015.2446198","article-title":"Random-walk based solution to triple level stochastic point location problem","author":"Jiang","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2019.08.109_bib0098","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1016\/j.patcog.2009.08.002","article-title":"An efficient local Chan-Vese model for image segmentation","author":"Wang","year":"2010","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.neucom.2019.08.109_bib0099","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TKDE.2009.21","article-title":"A novel density-based clustering framework by using level set method","author":"Wang","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.neucom.2019.08.109_bib0100","first-page":"2428","article-title":"A novel multi-layer level set method for image segmentation","author":"Wang","year":"2008","journal-title":"J. Univ. Comput. Sci."},{"key":"10.1016\/j.neucom.2019.08.109_bib0101","series-title":"Proceedings of the Pacific Rim Conference on Multimedia","first-page":"722","article-title":"Chinese Characters Recognition from Screen-Rendered Images Using Inception Deep Learning Architecture","author":"Xu","year":"2017"},{"key":"10.1016\/j.neucom.2019.08.109_bib0104","series-title":"Proceedings of the 8th International Conference on Document Analysis and Recognition","first-page":"935","article-title":"ScatterType: A legible but hard-to-segment CAPTCHA","author":"Baird","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0105","series-title":"Proceedings of the Third European Workshop on System Security","first-page":"36","article-title":"The robustness of a new CAPTCHA","author":"El Ahmad","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0106","series-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security","first-page":"125","article-title":"Text-based CAPTCHA strengths and weaknesses","author":"Bursztein","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0107","series-title":"Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT 14)","article-title":"The end is nigh: Generic solving of text-based captchas","author":"Bursztein","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0108","doi-asserted-by":"crossref","first-page":"2396","DOI":"10.1016\/j.neucom.2006.02.016","article-title":"A novel adaptive sequential niche technique for multimodal function optimization","author":"Zhang","year":"2006","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.neucom.2019.08.109_bib0109","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1049\/iet-ifs.2014.0381","article-title":"Robustness of text-based completely automated public turing test to tell computers and humans apart","volume":"10","author":"Gao","year":"2016","journal-title":"Inf. Secur. IET"},{"key":"10.1016\/j.neucom.2019.08.109_bib0110","series-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","article-title":"A Simple Generic Attack on Text Captchas","author":"Gao","year":"2016"},{"issue":"2","key":"10.1016\/j.neucom.2019.08.109_bib0111","first-page":"188","article-title":"A survey on CAPTCHA technique based on drag and drop mouse action","volume":"3","author":"Bhalani","year":"2015","journal-title":"Int. J. Tech. Res. Appl."},{"issue":"6368","key":"10.1016\/j.neucom.2019.08.109_bib0112","doi-asserted-by":"crossref","DOI":"10.1126\/science.aag2612","article-title":"A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs","volume":"358","author":"George","year":"2017","journal-title":"Science"},{"key":"10.1016\/j.neucom.2019.08.109_bib0113","series-title":"Proceedings of the Annual IEEE India Conference","first-page":"1","article-title":"Drag and drop: a better approach to captcha","author":"Desai","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0114","series-title":"Proceedings of the IEEE International Advance Computing Conference IACC","first-page":"1286","article-title":"Sequenced tagged captcha: Generation and its analysis","author":"Gupta","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0115","series-title":"Proceedings of the IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH)","first-page":"427","article-title":"Analysis of tagging variants of Sequenced Tagged Captcha (STC)","author":"Raj","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0116","series-title":"Proceedings of the IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"iCAPTCHA: the next generation of CAPTCHA designed to defend against 3rd party human attacks","author":"Truong","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0117","series-title":"Proceedings of 4th J&K Science Congress 12th to 14th","article-title":"Drag and drop image captcha","author":"Shah","year":"2008"},{"issue":"3","key":"10.1016\/j.neucom.2019.08.109_bib0118","first-page":"001","article-title":"A Survey on Spelling Based CAPTCHA","volume":"3","author":"James","year":"2014","journal-title":"IJRCCT"},{"key":"10.1016\/j.neucom.2019.08.109_bib0119","series-title":"Proceedings of the Conference on Technologies and Applications of Artificial Intelligence","first-page":"158","article-title":"DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks","author":"Ye","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0120","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.future.2014.11.004","article-title":"ADAMAS: Interweaving unicode and color to enhance CAPTCHA security","author":"Roshanbin","year":"2016","journal-title":"Future Generation Comput. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0121","unstructured":"G. O. S. Blog, \"Are you a robot? Introducing \u201cNo CAPTCHA reCAPTCHA\u201d,\" ed,2014."},{"key":"10.1016\/j.neucom.2019.08.109_bib0122","series-title":"Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCCT)","first-page":"556","article-title":"Uncover impact factors of text-based CAPTCHA identification","author":"Tamang","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0123","series-title":"Proceedings of the 22nd International Conference on World Wide Web","first-page":"159","article-title":"Framework for evaluation of text captchas","author":"Thomas","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0124","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neucom.2008.09.030","article-title":"Supervised feature extraction based on orthogonal discriminant projection","author":"Li","year":"2009","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0125","doi-asserted-by":"crossref","first-page":"3287","DOI":"10.1016\/j.patcog.2008.05.014","article-title":"Feature extraction using constrained maximum variance mapping","author":"Li","year":"2008","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.neucom.2019.08.109_bib0126","series-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"388","article-title":"I am robot:(deep) learning to break semantic image captchas","author":"Sivakorn","year":"2016"},{"issue":"1","key":"10.1016\/j.neucom.2019.08.109_bib0127","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11263-015-0823-z","article-title":"Reading text in the wild with convolutional neural networks","volume":"116","author":"Jaderberg","year":"2016","journal-title":"Int. J. Comput. Vision"},{"key":"10.1016\/j.neucom.2019.08.109_bib0128","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.ipl.2017.07.009","article-title":"CAPTCHA-based image annotation","author":"Kwon","year":"2017","journal-title":"Inf. Process. Lett."},{"key":"10.1016\/j.neucom.2019.08.109_bib0129","unstructured":"B. Zhu, J. Liu, Q. Li, S. Li, and N. Xu, \"Image-based CAPTCHA exploiting context in object recognition,\" ed: Google Patents, 2013."},{"key":"10.1016\/j.neucom.2019.08.109_bib0130","unstructured":"P. N. Aleksandrovich, N. I. Alekseevich, V. M. Vladimirovich, N. A. Igorevich, P. V. Borisovna, and N. O. Igorevna, \"Image-based captcha system,\" ed: Google Patents, 2012."},{"key":"10.1016\/j.neucom.2019.08.109_bib0131","first-page":"1489","article-title":"A general CPL-AdS methodology for fixing dynamic parameters in dual environments","author":"Huang","year":"2012","journal-title":"IEEE Trans. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0132","series-title":"Proceedings of the 28th International Conference on Information Technology Interfaces","first-page":"475","article-title":"Drawing captcha","author":"Shirali-Shahreza","year":"2006"},{"key":"10.1016\/j.neucom.2019.08.109_bib0133","series-title":"Proceedings of the International Conference on Industrial and Information Systems (ICIIS)","first-page":"210","article-title":"User friendly line CAPTCHAs","author":"Karunathilake","year":"2009"},{"issue":"3","key":"10.1016\/j.neucom.2019.08.109_bib0134","article-title":"AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups","volume":"8","author":"Kim","year":"2014","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0135","series-title":"Proceedings of the Twelfth Australasian User Interface Conference-Volume 117","first-page":"3","article-title":"A new CAPTCHA interface design for mobile devices","author":"Lin","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0136","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00521-009-0274-y","article-title":"An improved approximation approach incorporating particle swarm optimization and a priori information into neural networks","author":"Han","year":"2010","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.neucom.2019.08.109_bib0137","doi-asserted-by":"crossref","first-page":"3813","DOI":"10.1016\/j.patcog.2008.05.027","article-title":"Locally linear discriminant embedding: An efficient method for face recognition","author":"Li","year":"2008","journal-title":"Pattern Recognit."},{"issue":"6","key":"10.1016\/j.neucom.2019.08.109_bib0138","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s00530-003-0122-3","article-title":"Artifacial: Automated reverse turing test using facial features","volume":"9","author":"Rui","year":"2004","journal-title":"Multimed. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0139","series-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security","first-page":"187","article-title":"Attacks and design of image recognition CAPTCHAs","author":"Zhu","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0140","series-title":"Proceedings of the IEEE SoutheastCon","first-page":"165","article-title":"2d captchas from 3d models","author":"Hoque","year":"2006"},{"key":"10.1016\/j.neucom.2019.08.109_bib0141","series-title":"Proceedings of the International Conference on Information Science and Applications (ICISA)","first-page":"1","article-title":"3D CAPTCHA: A next generation of the CAPTCHA","author":"Imsamai","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0142","series-title":"Proceedings of the International Conference on Information Security and Cryptology","first-page":"391","article-title":"Breaking a 3D-based CAPTCHA scheme","author":"Nguyen","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0143","series-title":"Proceedings of the Eighth Australasian Conference on Information Security-Volume 105","first-page":"39","article-title":"Impeding CAPTCHA breakers with visual decryption","author":"Lang","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0144","series-title":"Proceedings of the International Conference on Information Security","first-page":"268","article-title":"Image recognition captchas","author":"Chew","year":"2004"},{"key":"10.1016\/j.neucom.2019.08.109_bib0145","series-title":"Proceedings of the 9th International Symposium on Signal Processing and Its Applications ISSPA","first-page":"1","article-title":"Collage captcha","author":"Shirali-Shahreza","year":"2007"},{"key":"10.1016\/j.neucom.2019.08.109_bib0146","series-title":"Proceedings of the Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on","first-page":"351","article-title":"A novel image based CAPTCHA using jigsaw puzzle","author":"Gao","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0147","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","first-page":"366","article-title":"Asirra: a CAPTCHA that exploits interest-aligned manual image categorization","author":"Elson","year":"2007"},{"issue":"4","key":"10.1016\/j.neucom.2019.08.109_bib0148","first-page":"215","article-title":"CAPTCHA: a survey of usability features","volume":"3","author":"Pakdel","year":"2011","journal-title":"Res. J. Inf. Technol."},{"key":"10.1016\/j.neucom.2019.08.109_bib0149","series-title":"Proceedings of the Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence","article-title":"CAPTCHAs with a Purpose","author":"Aggarwal","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0150","series-title":"Proceedings of the 13th Annual ACM International Conference on Multimedia","first-page":"331","article-title":"IMAGINATION: a robust image-based CAPTCHA generation system","author":"Datta","year":"2005"},{"issue":"3","key":"10.1016\/j.neucom.2019.08.109_bib0151","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/TIFS.2009.2022709","article-title":"Exploiting the Human\u2013machine gap in image recognition for designing CAPTCHAs","volume":"4","author":"Datta","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.neucom.2019.08.109_bib0152","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1007\/s00371-010-0469-3","article-title":"A new image-based CAPTCHA using the orientation of the polygonally cropped sub-images","volume":"26","author":"Kim","year":"2010","journal-title":"Visual Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0153","series-title":"Proceedings of the 5th ACM Multimedia Systems Conference","first-page":"81","article-title":"DeepCAPTCHA: an image CAPTCHA based on depth perception","author":"Nejati","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0154","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cose.2016.03.007","article-title":"Development of two novel face-recognition CAPTCHAs: a security and usability study","author":"Schryen","year":"2016","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0155","doi-asserted-by":"crossref","unstructured":"D., Brodi\u0107, et\u00a0al., Usability Analysis of the Image and Interactive CAPTCHA via Prediction of the Response Time. 2017.","DOI":"10.1007\/978-3-319-69456-6_21"},{"key":"10.1016\/j.neucom.2019.08.109_bib0156","series-title":"Proceedings of the 18th International Conference on World Wide Web","first-page":"841","article-title":"What's up CAPTCHA?: a CAPTCHA based on image orientation","author":"Gossweiler","year":"2009"},{"issue":"2","key":"10.1016\/j.neucom.2019.08.109_bib0157","first-page":"105","article-title":"Image flip CAPTCHA","volume":"1","author":"Banday","year":"2009","journal-title":"ISC Int. J. Inf. Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0158","series-title":"Proceedings of the 19th International Conference On World Wide Web","first-page":"821","article-title":"Sketcha: a CAPTCHA based on Line Drawings of 3D Models","author":"Ross","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0159","series-title":"Proceedings of the 27th Annual Computer Security Applications Conference","first-page":"237","article-title":"SEMAGE: a new image-based two-factor CAPTCHA","author":"Vikram","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0160","series-title":"Proceedings of the IEEE International Conference on Systems, Man and Cybernetics SMC","first-page":"4906","article-title":"Telling computers and humans apart automatically using activity recognition","author":"Vimina","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0161","series-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","first-page":"345","article-title":"Scene tagging: image-based CAPTCHA using image composition and object relationships","author":"Matthews","year":"2010"},{"issue":"3","key":"10.1016\/j.neucom.2019.08.109_bib0162","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.cose.2008.11.002","article-title":"Preventing massive automated access to web resources","volume":"28","author":"Basso","year":"2009","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0163","series-title":"Proceedings of the Document Recognition and Retrieval XII,","first-page":"191","article-title":"Implicit captchas","author":"Baird","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0165","series-title":"Proceedings of the Human Interactive Proofs","first-page":"97","article-title":"Leveraging the CAPTCHA problem","author":"Lopresti","year":"2005"},{"key":"10.1016\/j.neucom.2019.08.109_bib0166","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.future.2012.08.013","article-title":"FaceDCAPTCHA: Face detection based color image CAPTCHA","author":"Goswami","year":"2014","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0167","series-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","first-page":"501","article-title":"Faces in the distorting mirror: Revisiting photo-based social authentication","author":"Polakis","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0168","series-title":"Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","first-page":"1","article-title":"I don't like putting my face on the Internet!\": An acceptance study of face biometrics as a CAPTCHA replacement","author":"Krol","year":"2016"},{"issue":"2","key":"10.1016\/j.neucom.2019.08.109_bib0169","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1587\/transinf.2017EDL8175","article-title":"CAPTCHA image generation systems using generative adversarial networks","volume":"101","author":"Kwon","year":"2018","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0170","series-title":"Proceedings of the 4th International Conference on Intelligent Human Computer Interaction (IHCI)","first-page":"1","article-title":"Image CAPTCHA: Based on human understanding of real world distances","author":"Aadhirai","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0171","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/ACCESS.2014.2321001","article-title":"fgCAPTCHA: Genetically Optimized Face Image CAPTCHA 5","author":"Powell","year":"2014","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2019.08.109_bib0172","series-title":"Proceedings of the International Conference on Trustworthy Computing and Services","first-page":"420","article-title":"An efficient ellipse-shaped blobs detection algorithm for breaking Facebook CAPTCHA","author":"Liu","year":"2012"},{"issue":"2","key":"10.1016\/j.neucom.2019.08.109_bib0173","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1007\/s11042-013-1422-z","article-title":"FaceCAPTCHA: a CAPTCHA that identifies the gender of face images unrecognized by existing gender classifiers","volume":"72","author":"Kim","year":"2014","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.neucom.2019.08.109_bib0174","series-title":"Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM)","first-page":"2248","article-title":"The robustness of face-based CAPTCHAs","author":"Gao","year":"2015"},{"key":"10.1016\/j.neucom.2019.08.109_bib0175","series-title":"Proceedings of the Telecommunications AICT-ICIW'06. International Conference on Internet and Web Applications and Services\/Advanced International Conference on","article-title":"Face recognition captchas","author":"Misra","year":"2006"},{"key":"10.1016\/j.neucom.2019.08.109_bib0176","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.neucom.2013.01.003","article-title":"The nearest-farthest subspace classification for face recognition","author":"Mi","year":"2013","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0177","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"5165","article-title":"Symmetry reCAPTCHA","author":"Funk","year":"2016"},{"key":"10.1016\/j.neucom.2019.08.109_bib0178","unstructured":"M. Osadchy, J. Hernandez-Castro, S. Gibson, and O. Dunkelman, \"No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA,\" Cryptology ePrint Archive: 2016\/336, 2016."},{"issue":"6","key":"10.1016\/j.neucom.2019.08.109_bib0179","article-title":"understanding CAPTCHA: text and audio based CAPTCHA with its applications","volume":"3","author":"Choudhary","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"10.1016\/j.neucom.2019.08.109_bib0180","unstructured":"F. C. Fisk, S. Ramanathan, M. A. Terry, and M. B. Trevathan, \"Advanced audio CAPTCHA,\" ed: Google Patents. 2013."},{"key":"10.1016\/j.neucom.2019.08.109_bib0181","series-title":"Proceedings of the 9th international ACM SIGACCESS Conference on Computers and Accessibility","first-page":"245","article-title":"Developing usable CAPTCHAs for blind users","author":"Holman","year":"2007"},{"key":"10.1016\/j.neucom.2019.08.109_bib0182","series-title":"Proceedings of the International Workshop on Security","first-page":"36","article-title":"Solving Google's continuous audio CAPTCHA with HMM-based automatic speech recognition","author":"Sano","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0183","series-title":"Proceedings of the Security and Privacy (SP), 2011 IEEE Symposium on","first-page":"19","article-title":"The failure of noise-based non-continuous audio captchas","author":"Bursztein","year":"2011"},{"key":"10.1016\/j.neucom.2019.08.109_bib0184","series-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies","first-page":"8","article-title":"Decaptcha: breaking 75% of eBay audio CAPTCHAs","author":"Bursztein","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0185","series-title":"Proceedings of the ISECS International Colloquium on Computing, Communication, Control, and Management","first-page":"221","article-title":"Spoken captcha: A captcha system for blind users","author":"Shirali-Shahreza","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0186","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"2147","article-title":"Seesay and hearsay captcha for mobile interaction","author":"Shirali-Shahreza","year":"2013"},{"key":"10.1016\/j.neucom.2019.08.109_bib0187","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"1829","article-title":"Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use","author":"Bigham","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0188","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"2267","article-title":"The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users","author":"Lazar","year":"2012"},{"issue":"5","key":"10.1016\/j.neucom.2019.08.109_bib0189","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TDSC.2013.52","article-title":"Security analysis and related usability of motion-based captchas: Decoding codewords in motion","volume":"11","author":"Xu","year":"2014","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0190","series-title":"Proceedings of the Third International Symposium on Electronic Commerce and Security (ISECS)","first-page":"265","article-title":"An audio CAPTCHA to distinguish humans from computers","author":"Gao","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0192","series-title":"Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence","first-page":"226","article-title":"Using a test-to-speech synthesizer to generate a reverse Turing test","author":"Chan","year":"2003"},{"issue":"5","key":"10.1016\/j.neucom.2019.08.109_bib0193","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1016\/j.cose.2009.12.003","article-title":"Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony","volume":"29","author":"Soupionis","year":"2010","journal-title":"Comput. Secur."},{"issue":"9","key":"10.1016\/j.neucom.2019.08.109_bib0194","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1080\/0144929X.2014.898793","article-title":"Investigating the effects of sound masking on the use of audio CAPTCHAs","volume":"33","author":"Olalere","year":"2014","journal-title":"Behav. Inf. Technol."},{"key":"10.1016\/j.neucom.2019.08.109_bib0195","series-title":"Proceedings of the IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"270","article-title":"Text-based CAPTCHA using phonemic restoration effect and similar sounds","author":"Goto","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0196","series-title":"Proceedings of the Advances in Neural Information Processing Systems","first-page":"1625","article-title":"Breaking audio captchas","author":"Tam","year":"2008"},{"issue":"2016","key":"10.1016\/j.neucom.2019.08.109_bib0197","first-page":"225","article-title":"Feature extraction using maximum nonparametric margin projection","volume":"188","author":"Li","year":"2016","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0198","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.neucom.2015.01.099","article-title":"Constrained discriminant neighborhood embedding for high dimensional data feature extraction","volume":"173","author":"B.Li","year":"2016","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0199","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.neucom.2014.11.012","article-title":"Nonparametric discriminant multi-manifold learning for dimensionality reduction","volume":"152","author":"B.Li","year":"2015","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2019.08.109_bib0200","series-title":"Proceedings of the 30th Annual Computer Security Applications Conference","first-page":"276","article-title":"Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security","author":"Meutzner","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0201","series-title":"Proceedings of the 13th International Conference on Machine Learning and Applications (ICMLA)","first-page":"67","article-title":"Reducing the cost of breaking audio captchas by active and semi-supervised learning","author":"Darnst\u00e4dt","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0202","series-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","first-page":"2335","article-title":"Constructing secure audio captchas by exploiting differences between humans and machines","author":"Meutzner","year":"2015"},{"key":"10.1016\/j.neucom.2019.08.109_bib0203","series-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 16)","article-title":"Hidden voice commands","author":"Carlini","year":"2016"},{"key":"10.1016\/j.neucom.2019.08.109_bib0204","series-title":"Proceedings of the Asia Conference on Computer and Communications Security","first-page":"833","article-title":"POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System","author":"Choi","year":"2018"},{"key":"10.1016\/j.neucom.2019.08.109_bib0205","series-title":"Proceedings of the Symposium On Usable Privacy and Security (SOUPS)","article-title":"Improving audio captchas","author":"Tam","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0206","series-title":"Proceedings of the International Conference on Conference on Computational Intelligence and Multimedia Applications","first-page":"54","article-title":"Question-based captcha","author":"Shirali-Shahreza","year":"2007"},{"issue":"7","key":"10.1016\/j.neucom.2019.08.109_bib0207","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1080\/10447318.2015.1038124","article-title":"\u03bccaptcha: Human Interaction Proofs Tailored to Touch-Capable Devices via Math Handwriting","volume":"31","author":"Leiva","year":"2015","journal-title":"Int. J. Human Comput. Interact."},{"issue":"1","key":"10.1016\/j.neucom.2019.08.109_bib0208","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.cose.2009.06.006","article-title":"Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study","volume":"29","author":"Hernandez-Castro","year":"2010","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0209","series-title":"Proceedings of the International Conference on E-Business and E-Government (ICEE)","first-page":"1277","article-title":"A CAPTCHA implementation based on moving objects recognition problem","author":"Cui","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0210","series-title":"Proceedings of the International Symposium on Communications and Information Technologies ISCIT","first-page":"436","article-title":"Dynamic captcha","author":"Shirali-Shahreza","year":"2008"},{"key":"10.1016\/j.neucom.2019.08.109_bib0211","unstructured":"B. M. Jakobsson, J. R. Palmer, and G. Maldonado, \"Interactive CAPTCHA,\" ed: Google Patents, 2013."},{"key":"10.1016\/j.neucom.2019.08.109_bib0212","series-title":"Proceedings of the Second International Workshop on Education Technology and Computer Science","first-page":"23","article-title":"A 3-layer dynamic CAPTCHA implementation","author":"Cui","year":"2010"},{"key":"10.1016\/j.neucom.2019.08.109_bib0213","series-title":"Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT)","first-page":"90","article-title":"Dynamic image based captcha","author":"ur Rahman","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0214","unstructured":"E. Bursztein, \"How we broke the NuCaptcha video scheme and what we proposed to fix it,\" See http:\/\/elie.im\/blog\/security\/how-we-broke-the-nucaptcha\\-video-scheme-and-what-we-propose-to-fix-it\/, Accessed March, 2012."},{"key":"10.1016\/j.neucom.2019.08.109_bib0215","series-title":"Proceedings of the International Conference on Applied Cryptography and Network Security","first-page":"12","article-title":"Breaking an animated CAPTCHA scheme","author":"Nguyen","year":"2012"},{"issue":"5","key":"10.1016\/j.neucom.2019.08.109_bib0216","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1145\/1618452.1618509","article-title":"Emerging images","volume":"28","author":"Mitra","year":"2009","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"10.1016\/j.neucom.2019.08.109_bib0217","series-title":"Proceedings of the 21st USENIX Security Symposium (USENIX Security 12)","first-page":"49","article-title":"Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion","author":"Xu","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0218","series-title":"Proceedings of the 5th Symposium on Usable Privacy and Security","first-page":"14","article-title":"Balancing usability and security in a video CAPTCHA","author":"Kluever","year":"2009"},{"key":"10.1016\/j.neucom.2019.08.109_bib0219","series-title":"Proceedings of the IFIP International Conference on Communications and Multimedia Security","first-page":"97","article-title":"Enhanced captchas: Using animation to tell humans and computers apart","author":"Athanasopoulos","year":"2006"},{"key":"10.1016\/j.neucom.2019.08.109_bib0220","series-title":"Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security","first-page":"195","article-title":"A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability","author":"Mohamed","year":"2014"},{"key":"10.1016\/j.neucom.2019.08.109_bib0221","series-title":"Proceedings of the 31st Annual Computer Security Applications Conference","first-page":"11","article-title":"Emerging Image Game CAPTCHAs for resisting automated and human-solver relay attacks","author":"Gao","year":"2015"},{"key":"10.1016\/j.neucom.2019.08.109_bib0223","series-title":"Proceedings of the HCTL Open In. J. Technol. Innovat. Res. (IJTIR)","article-title":"A Survey of Captcha based Web and Application Security Methods and Techniques","author":"Mahato","year":"2015"},{"key":"10.1016\/j.neucom.2019.08.109_bib0224","series-title":"Proceedings of the Handbook of Information and Communication Security","first-page":"273","article-title":"Anti-bot strategies based on human interactive proofs","author":"Basso","year":"2010"},{"issue":"1","key":"10.1016\/j.neucom.2019.08.109_bib0225","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/B978-0-12-385510-7.00003-5","article-title":"Captchas: An artificial intelligence application to web security","volume":"83","author":"Hidalgo","year":"2011","journal-title":"Adv. Comput."},{"issue":"10","key":"10.1016\/j.neucom.2019.08.109_bib0226","doi-asserted-by":"crossref","first-page":"2522","DOI":"10.1109\/TIFS.2018.2821096","article-title":"Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha","volume":"13","author":"Tang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2019.08.109_bib0228","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1142\/S0218001404003824","article-title":"Genetic optimization of radial basis probabilistic neural networks","author":"Zhao","year":"2004","journal-title":"Int. J. Pattern Recognit Artif Intell."},{"key":"10.1016\/j.neucom.2019.08.109_bib0229","doi-asserted-by":"crossref","DOI":"10.1109\/TNNLS.2018.2876865","article-title":"Object detection with deep learning: a review","author":"Zhao","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.neucom.2019.08.109_bib0230","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.patcog.2016.02.016","article-title":"Corrupted and Occluded Face Recognition via Cooperative Sparse Representation","author":"Zhao","year":"2016","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.neucom.2019.08.109_bib0231","first-page":"916","article-title":"Classification of plant leaf images with complicated background","author":"Wang","year":"2008","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0232","doi-asserted-by":"crossref","first-page":"4492","DOI":"10.1109\/TIP.2012.2204271","article-title":"Completed local binary count for rotation invariant texture classification","author":"Zhao","year":"2012","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"10.1016\/j.neucom.2019.08.109_bib0233","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","article-title":"Backpropagation applied to handwritten zip code recognition","volume":"1","author":"LeCun","year":"1989","journal-title":"Neural Comput."},{"key":"10.1016\/j.neucom.2019.08.109_bib0234","series-title":"Proceedings of the Advances in Neural Information Processing Systems","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"Krizhevsky","year":"2012"},{"key":"10.1016\/j.neucom.2019.08.109_bib0235","unstructured":"C. Szegedy et\u00a0al., \"Intriguing properties of neural networks,\" arXiv preprint arXiv:1312.6199, 2013."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231220304896?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231220304896?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:33:14Z","timestamp":1615681994000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231220304896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":224,"alternative-id":["S0925231220304896"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2019.08.109","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A survey of CAPTCHA technologies to distinguish between human and computer","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2019.08.109","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}