Document image analysis
Document degradation models and a methodology for degradation model validation
Document degradation models and a methodology for degradation model validation
Large-Scale Simulation Studies in Image Pattern Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Optical Character Recognition: An Illustrated Guide to the Frontier
Optical Character Recognition: An Illustrated Guide to the Frontier
Locating and Recognizing Text in WWW Images
Information Retrieval
Minds and Machines
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Pessimal Print: A Reverse Turing Test
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Using Character Recognition and Segmentation to Tell Computer from Humans
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
ARTiFACIAL: automated reverse turing test using FACIAL features
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
A Human Interactive Proof Algorithm Using Handwriting Recognition
ICDAR '05 Proceedings of the Eighth International Conference on Document Analysis and Recognition
Embedded noninteractive continuous bot detection
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Balancing usability and security in a video CAPTCHA
Proceedings of the 5th Symposium on Usable Privacy and Security
Synthetic handwritten CAPTCHAs
Pattern Recognition
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
An automated reverse turing test using facial expressions
HSI'09 Proceedings of the 2nd conference on Human System Interactions
Knowledge-based user authentication associated with biometrics
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Leveraging cognitive factors in securing WWW with CAPTCHA
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Attacks and design of image recognition CAPTCHAs
Proceedings of the 17th ACM conference on Computer and communications security
Protection through multimedia CAPTCHAs
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
SEMAGE: a new image-based two-factor CAPTCHA
Proceedings of the 27th Annual Computer Security Applications Conference
Building segmentation based human-friendly human interaction proofs (HIPs)
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
A highly legible CAPTCHA that resists segmentation attacks
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Visual CAPTCHA with handwritten image analysis
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Characters or faces: a user study on ease of use for HIPs
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Programming hybrid services in the cloud
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Protection through Intelligent and Multimedia Captchas
International Journal of Adaptive, Resilient and Autonomic Systems
A survey and analysis of current CAPTCHA approaches
Journal of Web Engineering
FaceDCAPTCHA: Face detection based color image CAPTCHA
Future Generation Computer Systems
Hi-index | 0.00 |
The recently initiated and rapidly developing research field of 'human interactive proofs' (HIPs) and its implications for the document image analysis (DIA) research field are described. Over the last five years, efforts to defend Web services against abuse by programs ('bots') have led to a new family of security protocols able to distinguish between human and machine users. AltaVista pioneered this technology in 1997 [Bro01, LBBB01]. By the summer of 2000, Yahoo! and PayPal were using similar methods. In the Fall of 2000, Prof. Manuel Blum of Carnegie-Mellon University and his team, stimulated by Udi Manber of Yahoo!, were studying these and related problems [BAL00]. Soon thereafter a collaboration between the University of California at Berkeley and the Palo Alto Research Center (PARC) built a tool based on systematically generated image degradations [CBF01]. In January 2002, Prof. Blum and the present authors ran the first workshop (at PARC) on HIPs, defined broadly as a class of challenge/response protocols which allow a human to authenticate herself as a member of a given group - e.g. human (vs. machine), herself (vs. anyone else), an adult (vs. a child), etc. All commercial uses of HIPs known to us exploit the gap in ability between human and machine vision systems in reading images of machine printed text. Many technical issues that have been systematically studied by the DIA community are relevant to the HIP research program. This paper describes the evolution of HIP R&D, applications of HIPs now and on the horizon, highlights of the first HIP workshop, and proposals for a DIA research agenda to advance the state of the art of HIPs.