
References
[1] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “CAPTCHA:
Using hard ai problems for security,” in EUROCRYPT ’03.
[2] M. Foley, ““Prove You’re Human”: Fetishizing material embodiment
and immaterial labor in information networks,” Critical Studies in
Media Communication, vol. 31, no. 5, pp. 365–379, 2014.
[3] E. Jeremy, J. R. Douceur, J. Howell, and J. Sault, “Asirra: a
CAPTCHA that exploits interest-aligned manual image
categorization,” in CCS ’07.
[4] Distil Networks. CAPTCHAs Have Negative Impact on Web Traffic
and Leads. http://www.distilnetworks.com/
distil-networks-study-captchas-negative-impact-on-web-traffic/.
[5] M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker,
and S. Savage, “Re: CAPTCHAs: understanding captcha-solving
services in an economic context,” in USENIX Security ’10.
[6] E. Bursztein, J. Aigrain, A. Moscicki, and J. C. Mitchell, “The end
is nigh: Generic solving of text-based CAPTCHAs.” in USENIX
WOOT ’14.
[7] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas
in html5,” in W2SP ’12.
[8] B. B. Zhu, J. Yan, Q. Li, C. Yang, J. Liu, N. Xu, M. Yi, and K. Cai,
“Attacks and design of image recognition CAPTCHAs,” in CCS ’10.
[9] L. Von Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum,
“reCAPTCHA: Human-based character recognition via web security
measures,” Science, vol. 321, no. 5895, 2008.
[10] Google Online Security Blog, “Are you a robot? Introducing “No
CAPTCHA reCAPTCHA”,” http://googleonlinesecurity.blogspot.
com/2014/12/are-you- robot-introducing- no-captcha.html.
[11] I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, and V. Shet,
“Multi-digit number recognition from street view imagery using
deep convolutional neural networks,” in CoRR ’13.
[12] A. Karpathy and L. Fei-Fei, “Deep visual-semantic alignments for
generating image descriptions,” in CoRR ’14.
[13] M. Chew and J. D. Tygar, “Image recognition CAPTCHAs,” in ISC
’04.
[14] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan, “Show and tell: A
neural image caption generator,” in CoRR ’14.
[15] M. M. Kalayeh, H. Idrees, and M. Shah, “NMF-KNN: Image
Annotation Using Weighted Multi-view Non-negative Matrix
Factorization,” in CVPR ’14.
[16] N. Srivastava and R. Salakhutdinov, “Multimodal learning with
deep boltzmann machines,” Journal of Machine Learning Research,
vol. 15, pp. 2949–2980, 2014.
[17] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet
classification with deep convolutional neural networks,” in NIPS ’12.
[18] M. D. Zeiler, G. W. Taylor, and R. Fergus, “Adaptive
deconvolutional networks for mid and high level feature learning,”
in ICCV ’11.
[19] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick,
S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture
for fast feature embedding.”
[20] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation
of word representations in vector space,” in CoRR ’13.
[21] K. Thomas, D. Iatskiv, E. Bursztein, T. Pietraszek, C. Grier, and
D. McCoy, “Dialing back abuse on phone verified accounts,” in
CCS ’14.
[22] E. Homakov. The No CAPTCHA problem.
http://homakov.blogspot.in/2014/12/the-no-captcha-problem.html.
[23] I. Polakis, P. Ilia, F. Maggi, M. Lancini, G. Kontaxis, S. Zanero,
S. Ioannidis, and A. D. Keromytis, “Faces in the distorting mirror:
Revisiting photo-based social authentication,” in CCS ’14.
[24] R. H. Chan, C.-W. Ho, and M. Nikolova, “Salt-and-pepper noise
removal by median-type noise detectors and detail-preserving
regularization,” Trans. Img. Proc., vol. 14, no. 10, 2005.
[25] C. Liu, R. Szeliski, S. B. Kang, C. L. Zitnick, and W. T. Freeman,
“Automatic estimation and removal of noise from a single image,”
IEEE TPAMI, vol. 30, no. 2, 2008.
[26] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. J.
Goodfellow, and R. Fergus, “Intriguing properties of neural
networks,” in CoRR ’13.
[27] J. Yan, E. Ahmad, and A. Salah, “A low-cost attack on a microsoft
CAPTCHA,” in CCS ’08.
[28] ——, “Breaking visual CAPTCHAs with naive pattern recognition
algorithms,” in ACSAC ’07.
[29] S. Li, S. A. H. Shah, M. A. U. Khan, S. A. Khayam, A.-R. Sadeghi,
and R. Schmitz, “Breaking e-banking CAPTCHAs,” in ACSAC ’10.
[30] G. Mori and J. Malik, “Recognizing objects in adversarial clutter:
Breaking a visual CAPTCHA,” in CVPR ’03.
[31] E. Bursztein, S. Bethard, C. Fabry, J. C. Mitchell, and D. Jurafsky,
“How good are humans at solving CAPTCHAs? A large scale
evaluation,” in SP ’10.
[32] C. Cruz-Perez, O. Starostenko, F. Uceda-Ponga, V. Alarcon-Aquino,
and L. Reyes-Cabrera, “Breaking reCAPTCHAs with unpredictable
collapse: Heuristic character segmentation and recognition,” vol.
7329, 2012.
[33] P. Baecher, N. B¨
uscher, M. Fischlin, and B. Milde, “Breaking
reCAPTCHA: a holistic approach via shape recognition,” in Future
Challenges in Security and Privacy for Academia and Industry,
2011, vol. 354.
[34] O. Starostenko, C. Cruz-Perez, F. Uceda-Ponga, and
V. Alarcon-Aquino, “Breaking text-based CAPTCHAs with variable
word and character orientation,” Pattern Recognition, vol. 48, 2015.
[35] E. Bursztein, M. Martin, and J. C. Mitchell, “Text based
CAPTCHA strengths and weaknesses,” in CCS ’11.
[36] E. Bursztein, A. Moscicki, C. Fabry, S. Bethard, J. C. Mitchell, and
D. Jurafsky, “Easy does it: More usable CAPTCHAs,” in CHI ’14.
[37] Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, and
P. van Oorschot, “Security and usability challenges of
moving-object CAPTCHAs: Decoding codewords in motion,” in
USENIX Security ’12.
[38] P. Golle, “Machine learning attacks against the asirra CAPTCHA,”
in CCS ’08.
[39] G. Goswami, B. M. Powell, M. Vatsa, R. Singh, and A. Noore,
“FaceDCAPTCHA: Face detection based color image CAPTCHA,”
Future Generation Computer Systems, vol. 31, 2014.
[40] Y. Rui and Z. Liu, “Artifacial: Automated reverse turing test using
facial features,” in Multimedia ’03.
[41] S. Yardi, N. Feamster, and A. Bruckman, “Photo-based
authentication using social networks,” in WOSN ’08.
[42] I. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. D.
Keromytis, and S. Zanero, “All your face are belong to us: breaking
facebook’s social authentication,” in ACSAC ’12.
[43] M. Egele, L. Bilge, E. Kirda, and C. Kruegel, “CAPTCHA
smuggling: Hijacking web browsing sessions to create captcha
farms,” in SAC ’10.
[44] Y. Shin, M. Gupta, and S. Myers, “The nuts and bolts of a forum
spam automator,” in USENIX LEET ’11.
[45] B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna, “The
underground economy of spam: A botmasters perspective of
coordinating large-scale spam campaigns,” in USENIX LEET ’11.
[46] M. Jakobsson, “Captcha-free throttling,” in AISec ’09.
[47] M. Mohamed, S. Gao, N. Saxena, and C. Zhang, “Dynamic
cognitive game CAPTCHA usability and detection of
streaming-based farming,” in USEC ’14.
[48] SPAM tech. Cracking the AreYouAHuman Captcha. http:
//spamtech.co.uk/software/bots/cracking-the-areyouhuman-captcha/.