0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Image processing

Buy Now

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.) Loot Price: R1,569
Discovery Miles 15 690
Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings...

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.)

Henry S. Baird, Daniel P. Lopresti

Series: Lecture Notes in Computer Science, 3517

 (sign in to rate)
Loot Price R1,569 Discovery Miles 15 690 | Repayment Terms: R147 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Lecture Notes in Computer Science, 3517
Release date: May 2005
First published: 2005
Editors: Henry S. Baird • Daniel P. Lopresti
Dimensions: 235 x 155 x 8mm (L x W x T)
Format: Paperback
Pages: 596
Edition: 2005 ed.
ISBN-13: 978-3-540-26001-1
Categories: Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Applications of computing > Pattern recognition
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Books > Computing & IT > Applications of computing > Databases > General
Books > Computing & IT > Applications of computing > Image processing > General
LSN: 3-540-26001-3
Barcode: 9783540260011

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners