On the challenges that handwritten text images pose to computers and new practical applications
AI Rusu, V Govindaraju - Document recognition and retrieval …, 2005 - spiedigitallibrary.org
Most of the handwritten text challenges are usually either more severe or not encountered in
machine-printed text. In contrast to the traditional role of handwriting recognition in various …
machine-printed text. In contrast to the traditional role of handwriting recognition in various …
Handwritten CAPTCHA: Using the difference in the abilities of humans and machines in reading handwritten words
A Rusu, V Govindaraju - Ninth International Workshop on …, 2004 - ieeexplore.ieee.org
Handwritten text offers challenges that are rarely encountered in machine-printed text. In
addition, most problems faced in reading machine-printed text (eg, character recognition …
addition, most problems faced in reading machine-printed text (eg, character recognition …
Human interactive proofs and document image analysis
HS Baird, K Popat - Document Analysis Systems V: 5th International …, 2002 - Springer
The recently initiated and rapidly developing research field of 'human interactive
proofs'(HIPs) and its implications for the document image analysis (DIA) research field are …
proofs'(HIPs) and its implications for the document image analysis (DIA) research field are …
Complex image recognition and web security
HS Baird - Data complexity in pattern recognition, 2006 - Springer
Web services offered for human use are being abused by programs. Efforts to defend
against these abuses have, over the last 5 years, stimulated the development of a new …
against these abuses have, over the last 5 years, stimulated the development of a new …
Generation and use of handwritten CAPTCHAs
A Rusu, A Thomas, V Govindaraju - International Journal on Document …, 2010 - Springer
Automated recognition of unconstrained handwriting continues to be a challenging research
task. In contrast to the traditional role of handwriting recognition in applications such as …
task. In contrast to the traditional role of handwriting recognition in applications such as …
Handwritten text image authentication using back propagation
ASN Chakravarthy, PVK Raja, PS Avadhani - arXiv preprint arXiv …, 2011 - arxiv.org
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a …
involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a …
Preventing massive automated access to web resources
A Basso, S Sicco - computers & security, 2009 - Elsevier
Automated web tools are used to achieve a wide range of different tasks, some of which are
legal activities, whilst others are considered attacks to the security and data integrity of …
legal activities, whilst others are considered attacks to the security and data integrity of …
[PDF][PDF] Protecting web resources from massive automated access
A Basso - University of Torino, Technical RT114/08, 2008 - researchgate.net
This work attempts to find a practical and effective solution to prevent massive and
automated access to web resources. The basic idea is to avoid that a large quantity of …
automated access to web resources. The basic idea is to avoid that a large quantity of …
[PDF][PDF] Automatic person identification and verification using online handwriting
S Gupta - International Institute of Information Technology, 2008 - cvit.iiit.ac.in
Automatic person identification is one of the major concerns in this era of automation.
However, this is not a new problem and our society has adopted several different ways to …
However, this is not a new problem and our society has adopted several different ways to …
[PDF][PDF] Proposing a Scheme for Human Interactive Proof Test sing Plasma Effect
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to
differentiate between people and malicious computer programs. The mission of making …
differentiate between people and malicious computer programs. The mission of making …