[1]
Ahn, L. Von., Blum M., Hopper N "CAPTCHA: Telling humans and computers apart automatically", communication of the ACM, Vol. 47, No.2. (2004)
DOI: 10.1145/966389.966390
Google Scholar
[2]
Mori G and Malik J."Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA", CVPR'03, IEEE Computer Society, vol.1, pages:I-134 - I-141, 2003.
DOI: 10.1109/cvpr.2003.1211347
Google Scholar
[3]
Prem Shanker Yadava, Chandra Prakash Sahu, Sanjeev Kumar Shukla. Journal of Emerging Trends in Computing and Information Sciences, 2011, 701-704.
Google Scholar
[4]
Sam Hocevar. PWNtcha - captcha decoder web site, http://sam.zoy.org/pwntcha/, accessed Jan 2008.
Google Scholar
[5]
Elie Bursztein. Stanford University, Stanford, CA, USA Elie Bursztein,Matthieu Martin and John Mitchell. Text-based CAPTCHA strengths and weaknesses, CCS '11 Proceedings of the 18th ACM conference on Computer and communications security, 2011, 125-138
DOI: 10.1145/2046707.2046724
Google Scholar
[6]
Rizwan Ur Rahman. Journal of Global Research in Computer Science,2012,54-58
Google Scholar
[7]
Monica Chew and J. D. Tygar, UC Berkeley. "Image Recognition CAPTCHAs", In Proceedings of the 7th International Information Security Conference, 2004, 268-279
DOI: 10.1007/978-3-540-30144-8_23
Google Scholar
[8]
David Summer, Groton, Massachusetts."David Summer Communications Business and Technical communications Services"[Online] .2012/10/09. http://www.davidsummercommunications.com/audiocaptchademonstration/
Google Scholar
[9]
K Chellapilla, K Larson, P Simard, M Czerwinski, "Computers beat humans at single character recognition in reading-based Human Interaction Proofs", 2nd Conference on Email and Anti-Spam (CEAS), 2005.
Google Scholar
[10]
Thomas Claburn" Yahoo's CAPTCHA Security Reportedly Broken[Online] 2008/01/017" http://www.informationweek.com/yahoos-captcha-security-reportedly-broke/205900620
Google Scholar
[11]
Information on http://www.theregister.co.uk/2008/02/25/gmail captchacrack
Google Scholar
[12]
Dancho Danchev. "Microsoft's CAPTCHA successfully broken" ,[Online]2008/05/31. http://blogs.zdnet.com/security/?p=1232&tag=nl.e550.
Google Scholar
[13]
J.Yan and A. Ahmad. A Low-cost Attack on a Microsoft CAPCTHA. The 15th ACM Conference on Computer and Communications Securtity (CCS), 2008.
Google Scholar
[14]
K Chellapilla, K Larson, P Simard and M Czerwinski, "Building Segmentation Based Human-friendly Human Interaction Proofs", 2nd Int'l Workshop on Human Interaction Proofs, Springer-Verlag, LNCS 3517, 2005.
DOI: 10.1007/11427896_1
Google Scholar
[15]
Moni Noar."Verification of a human in the loop, or Identification via the Turing test",taken from wisdom.weizmann.ac.il, Available at http://www.wisdom.weizmann.ac.il/`nor/PAPERS/human.ps.
Google Scholar