Spiral CAPTCHA with Adversarial Perturbation and Its Security Analysis with Convolutional Neural Network
Author:
Shivani ,Krishna C. Rama
Publisher
Springer Singapore
Reference26 articles.
1. Ahn Von, L., Blum, M., Hopper, N. J., & Langford, J. (2003). CAPTCHA: Using hard AI problems for security. In Advances in Cryptology—EUROCRYPT 2003 (pp 294–311) 2. Bursztein, E., Martin, M., & Mitchell, J. (2011). Text-based CAPTCHA strengths and weaknesses. In Proceedings 18th ACM Conference Computer Communication Security—CCS 11, (pp 125). 3. Lee, L. Y., & Hsu, H. C. (2011). Usability study of text-based CAPTCHAs. In Displays (pp 81–86). 4. Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., & Wang, P. (2018). Research on deep learning techniques in breaking text-based Captchas and designing image-based Captcha. IEEE Transactions on Information Forensics and Security, 2522–2537. 5. Yan, J., Salah, A., & Ahmad, E. (2011). Captcha perspective. In Computer (pp 54–60).
|
|