Graphical Templates for Model Registration
IEEE Transactions on Pattern Analysis and Machine Intelligence
Algorithms on strings, trees, and sequences: computer science and computational biology
Algorithms on strings, trees, and sequences: computer science and computational biology
Using Spin Images for Efficient Object Recognition in Cluttered 3D Scenes
IEEE Transactions on Pattern Analysis and Machine Intelligence
On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
The Role of Holistic Paradigms in Handwritten Word Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Shape Matching and Object Recognition Using Shape Contexts
IEEE Transactions on Pattern Analysis and Machine Intelligence
A Layered Motion Representation with Occlusion and Compact Spatial Support
ECCV '02 Proceedings of the 7th European Conference on Computer Vision-Part I
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Model-based classification trees
IEEE Transactions on Information Theory
Using graphic turing tests to counter automated DDoS attacks against web servers
Proceedings of the 10th ACM conference on Computer and communications security
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Telling humans and computers apart automatically
Communications of the ACM - Information cities
Designing human friendly human interaction proofs (HIPs)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Practical application of visual illusions: errare humanum est
APGV '05 Proceedings of the 2nd symposium on Applied perception in graphics and visualization
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Efficient Shape Matching Using Shape Contexts
IEEE Transactions on Pattern Analysis and Machine Intelligence
IMAGINATION: a robust image-based CAPTCHA generation system
Proceedings of the 13th annual ACM international conference on Multimedia
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
On instant messaging worms, analysis and countermeasures
Proceedings of the 2005 ACM workshop on Rapid malcode
ScatterType: A Legible but Hard-to-Segment CAPTCHA
ICDAR '05 Proceedings of the Eighth International Conference on Document Analysis and Recognition
Recovering 3D Human Body Configurations Using Shape Contexts
IEEE Transactions on Pattern Analysis and Machine Intelligence
Shape Classification Using the Inner-Distance
IEEE Transactions on Pattern Analysis and Machine Intelligence
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
An Efficient Earth Mover's Distance Algorithm for Robust Histogram Comparison
IEEE Transactions on Pattern Analysis and Machine Intelligence
Deformation tolerant generalized Hough transform for sketch-based image retrieval in complex scenes
Image and Vision Computing
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
Embedded noninteractive continuous bot detection
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Avoiding Massive Automated Voting in Internet Polls
Electronic Notes in Theoretical Computer Science (ENTCS)
Image retrieval: Ideas, influences, and trends of the new age
ACM Computing Surveys (CSUR)
Multilevel Image Coding with Hyperfeatures
International Journal of Computer Vision
Assocaptcha: designing human-friendly secure captchas using word associations
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
Detecting Shrew HTTP Flood Attacks for Flash Crowds
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007
Machine learning attacks against the Asirra CAPTCHA
Proceedings of the 15th ACM conference on Computer and communications security
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
IEEE/ACM Transactions on Networking (TON)
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
IEEE/ACM Transactions on Networking (TON)
Research of the CAPTCHA application in platform based on AJAX
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
What's up CAPTCHA?: a CAPTCHA based on image orientation
Proceedings of the 18th international conference on World wide web
Research of the chinese CAPTCHA system based on AJAX
WSEAS Transactions on Circuits and Systems
Choose the red pill and the blue pill: a position paper
Proceedings of the 2008 workshop on New security paradigms
ACM SIGGRAPH Asia 2009 papers
KA-CAPTCHA: an opportunity for knowledge acquisition on the web
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Exploiting the human-machine gap in image recognition for designing CAPTCHAs
IEEE Transactions on Information Forensics and Security
An automated reverse turing test using facial expressions
HSI'09 Proceedings of the 2nd conference on Human System Interactions
HoneySpam 2.0: Profiling Web Spambot Behaviour
PRIMA '09 Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems
The robustness of a new CAPTCHA
Proceedings of the Third European Workshop on System Security
Sketcha: a captcha based on line drawings of 3D models
Proceedings of the 19th international conference on World wide web
An efficient segmentation algorithm for CAPTCHAs with line cluttering and character warping
Multimedia Tools and Applications
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
Towards A Universally Usable Human Interaction Proof: Evaluation of Task Completion Strategies
ACM Transactions on Accessible Computing (TACCESS)
Modeling human behavior for defense against flash-crowd attacks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A decision step for shape context matching
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Leveraging cognitive factors in securing WWW with CAPTCHA
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Attacks and design of image recognition CAPTCHAs
Proceedings of the 17th ACM conference on Computer and communications security
User-friendly matching protocol for online social networks
Proceedings of the 17th ACM conference on Computer and communications security
TagCaptcha: annotating images with CAPTCHAs
Proceedings of the international conference on Multimedia
ECCV'10 Proceedings of the 11th European conference on Computer vision: Part I
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Attacking image recognition CAPTCHAS: a naive but effective approach
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Distortion estimation techniques in solving visual CAPTCHAs
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Proceedings of the 26th Annual Computer Security Applications Conference
Distinguishing distributions using Chernoff information
ProvSec'10 Proceedings of the 4th international conference on Provable security
Robust tracking in aerial imagery based on an ego-motion Bayesian model
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Re: CAPTCHAs: understanding CAPTCHA-solving services in an economic context
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
CAPTCHA phishing: a practical attack on human interaction proofing
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
DevilTyper: a game for CAPTCHA usability evaluation
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Shape context and chamfer matching in cluttered scenes
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Shape context for image understanding
SSIP'05 Proceedings of the 5th WSEAS international conference on Signal, speech and image processing
The Global-Local transformation for noise resistant shape representation
Computer Vision and Image Understanding
An efficient password authentication method using CAPTCHA
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
SEMAGE: a new image-based two-factor CAPTCHA
Proceedings of the 27th Annual Computer Security Applications Conference
Hyperfeatures – multilevel local coding for visual recognition
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part I
Users and services in intelligent networks
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
An effective segmentation for noise-based image verification using gamma mixture models
ACCV'09 Proceedings of the 9th Asian conference on Computer Vision - Volume Part III
gore: routing-assisted defense against DDoS attacks
ISC'05 Proceedings of the 8th international conference on Information Security
Building segmentation based human-friendly human interaction proofs (HIPs)
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
A highly legible CAPTCHA that resists segmentation attacks
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Characters or faces: a user study on ease of use for HIPs
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Collaborative filtering CAPTCHAs
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
CAPTCHA generation as a web service
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Enhanced CAPTCHAs: using animation to tell humans and computers apart
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Computing eigen space from limited number of views for recognition
ICVGIP'06 Proceedings of the 5th Indian conference on Computer Vision, Graphics and Image Processing
AniCAP: an animated 3d CAPTCHA scheme based on motion parallax
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Comment spam classification in blogs through comment analysis and comment-blog post relationships
CICLing'12 Proceedings of the 13th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part II
A novel architecture for the generation of picture based CAPTCHA
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Enhanced STE3D-CAP: a novel 3d CAPTCHA family
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
Breaking an animated CAPTCHA scheme
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking a 3d-based CAPTCHA scheme
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Trajectory analysis for user verification and recognition
Knowledge-Based Systems
Segmentation of CAPTCHAs based on complex networks
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Proposal of CAPTCHA using three dimensional objects
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
CAPTCHA suitable for smartphones
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
A new CAPTCHA interface design for mobile devices
AUIC '11 Proceedings of the Twelfth Australasian User Interface Conference - Volume 117
A survey and analysis of current CAPTCHA approaches
Journal of Web Engineering
The robustness of hollow CAPTCHAs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
FaceDCAPTCHA: Face detection based color image CAPTCHA
Future Generation Computer Systems
Reading the legends of Roman Republican coins
Journal on Computing and Cultural Heritage (JOCCH)
Hi-index | 0.00 |
In this paper we explore object recognition in clutter. We test our object recognition techniques on Gimpy and EZ-Gimpy, examples of visual CAPTCHAs. A CAPTCHA ("Completely Automated Public Turing test to Tell Computers and Humans Apart") is a program that can generate and grade tests that most humans can pass, yet current computer programs can't pass. EZ-Gimpy (see Fig. 1, 5), currently used by Yahoo, and Gimpy (Fig. 2, 9) are CAPTCHAs based on word recognition in the presence of clutter. These CAPTCHAs provide excellent test sets since the clutter they contain is adversarial; it is designed to confuse computer programs. We have developed efficient methods based on shape context matching that can identify the word in an EZGimpy image with a success rate of 92%, and the requisite 3 words in a Gimpy image 33% of the time. The problem of identifying words in such severe clutter provides valuable insight into the more general problem of object recognition in scenes. The methods that we present are instances of a framework designed to tackle this general problem.