[1]MOIL S,SUEN C Y,YAMAMOTO K.Historical review of OCR research and development[J].Proceedings of IEEE,1992,80(7):1029-1058.
[2]SIMARD P,STEINKRAUS D,PLATT J.Best practice for convolutional neural networks applied to visual document analysis[C].Los Alamitos:International Conference on Document Analysis and Recognition (ICDAR),IEEE Computer Society,2003:958-962.
[3]AHN L,BLUM M,HOPPER N J,et al.The CAPTCHA web page[EB/OL].(2011-03-26)[2012-03-19]www.captcha.net.
[4]AHN L B,HOPPER M N.CAPTCHA:Using hard AI problems for security[J].Lecture Notes in Computer Sconce,2003,26(9):294-311.
[5]HOCEVAR S.PWNtcha[EB/OL].(2010-09-08)[2012-02-26]http://caca.Zoy.org.
[6]GREG M,JITENDRA M.Recognising objects in adversarial clutter:breaking a visual CAPTCHA[C].IEEE Conference on Computer Vision and Pattern Recognition (CVPR03),2003,1:134-141.
[7]HELLAPILLA K,LARSON K,SIMARD P,et a1.Computers beat humans at single character recognition in reading-based human interaction proofs[C].Stanford University,CA,USA:In Proceedings of the second Conference on Email and Anti-Spam,2005.
[8]YAN J,AHMAD A S E.A low-cost attack on a microsoft CAPTCHA[C].New York,USA:Proceedings of the ACM Conference Off Computer and Communications Security,ACM Press,2008:543-554. |