Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,035,248 papers from all fields of science
Search
Sign In
Create Free Account
CAPTCHA
Known as:
Image Verification
, Gausebeck-Levchin test
, Completely Automated Public Turing Test to Tell Computers and Humans Apart
Expand
A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
AI-complete
Adobe ColdFusion
Andrei Broder
Anti-spam techniques
Expand
Broader (2)
Computer security
Computer vision
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
CAPTCHA Recognition with Active Deep Learning
F. Stark
,
C. Hazirbas
,
Rudolph Triebel
,
D. Cremers
2015
Corpus ID: 18986535
CAPTCHAs are automated tests to tell computers and humans apart. They are designed to be easily solvable by humans, but…
Expand
Highly Cited
2012
Highly Cited
2012
The OU-ISIR Gait Database Comprising the Large Population Dataset and Performance Evaluation of Gait Recognition
Haruyuki Iwama
,
Mayu Okumura
,
Yasushi Makihara
,
Y. Yagi
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 4646924
This paper describes the world's largest gait database-the “OU-ISIR Gait Database, Large Population Dataset”-and its application…
Expand
Highly Cited
2011
Highly Cited
2011
Text-based CAPTCHA strengths and weaknesses
Elie Bursztein
,
Matthieu Martin
,
John C. Mitchell
Conference on Computer and Communications…
2011
Corpus ID: 3362043
We carry out a systematic study of existing visual CAPTCHAs based on distorted characters that are augmented with anti…
Expand
Highly Cited
2010
Highly Cited
2010
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Marti A. Motoyama
,
Kirill Levchenko
,
Chris Kanich
,
Damon McCoy
,
G. Voelker
,
S. Savage
USENIX Security Symposium
2010
Corpus ID: 11875247
Reverse Turing tests, or CAPTCHA s, have become an ubiquitous defense used to protect open Web resources from being exploited at…
Expand
Highly Cited
2010
Highly Cited
2010
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
Elie Bursztein
,
Steven Bethard
,
Celine Fabry
,
John C. Mitchell
,
Dan Jurafsky
IEEE Symposium on Security and Privacy
2010
Corpus ID: 14204454
Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them…
Expand
Highly Cited
2008
Highly Cited
2008
Usability of CAPTCHAs or usability issues in CAPTCHA design
Jeff Yan
,
A. S. E. Ahmad
Symposium On Usable Privacy and Security
2008
Corpus ID: 8630366
CAPTCHA is now almost a standard security technology, and has found widespread application in commercial websites. Usability and…
Expand
Highly Cited
2008
Highly Cited
2008
Machine learning attacks against the Asirra CAPTCHA
P. Golle
Conference on Computer and Communications…
2008
Corpus ID: 1987503
The Asirra CAPTCHA [EDHS2007], proposed at ACM CCS 2007, relies on the problem of distinguishing images of cats and dogs (a task…
Expand
Highly Cited
2007
Highly Cited
2007
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
J. Elson
,
J. Douceur
,
Jon Howell
,
J. Saul
Conference on Computer and Communications…
2007
Corpus ID: 8348576
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs…
Expand
Highly Cited
2007
Highly Cited
2007
Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms
Jeff Yan
,
A. S. E. Ahmad
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 14783783
Visual CAPTCHAs have been widely used across the Internet to defend against undesirable or malicious bot programs. In this paper…
Expand
Highly Cited
1998
Highly Cited
1998
A public key watermark for image verification and authentication
P. Wong
Proceedings International Conference on Image…
1998
Corpus ID: 15447332
We propose a public key watermarking algorithm for image integrity verification. This watermark is capable of detecting any…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE