537
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Little history of CAPTCHA

ORCID Icon
Pages 30-47 | Received 01 Feb 2020, Accepted 23 Sep 2020, Published online: 02 Nov 2020

References

  • Agre, P. E. (1994). Surveillance and capture: Two models of privacy. The Information Society, 10 (2), 101–127. https://doi.org/10.1080/01972243.1994.9960162
  • Ahn, L. V. (2006). Human computation. Google TechTalk. Mountain View, CA. https://www.youtube.com/watch?v=tx082gDwGcM.
  • Ahn, L. V. (2009). Teaching computers to read: google acquires ReCAPTCHA. Official Google Blog (blog). September 16, 2009. https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html.
  • Ahn, L., M., Kedia, & Blum, M. (2006). Verbosity: A game for collecting common-sense facts [Paper presentation]. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI ’06, Montreal, Canada., In, 75 ACM Press. https://doi.org/10.1145/1124772.1124784
  • Ahn, L. V. (2005). Human computation. School of Computer Science.
  • Ahn, L. V., Blum, M., Hopper, N. J., & Langford, J. (2003a). CAPTCHA: Using hard AI problems for security. In edited by Eli Biham (Ed.), Advances in cryptology — EUROCRYPT 2003 (vol. 2656, pp. 294–311). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-39200-9_18.
  • Ahn, L. V., Blum, M., Hopper, N. J., & Langford, J. (2003b). Captcha: Telling humans and computers apart automatically. In Proceedings of eurocrypt (pp. 294–311). Springer. https://doi.org/10.1007/3-540-39200-9_18.
  • Ahn, L. V., Blum, M., & Langford, J. (2002). CMU-CS-02-117 (computer science technical report abstracts). School of Computer Science, Carnegie Mellon University. http://reports-archive.adm.cs.cmu.edu/anon/2002/abstracts/02-117.html.
  • Ahn, L. V., Blum, M., & Langford, J. (2004). Telling humans and computers apart automatically. Communications of the ACM, 47(2), 56–60. https://doi.org/10.1145/966389.966390.
  • Ahn, L. V., & Dabbish, L. (2008). Designing games with a purpose. Communications of the ACM, 51(8), 57. https://doi.org/10.1145/1378704.1378719.
  • Ahn, L. V., & L. Dabbish. (2004). Labeling images with a computer game. In Proceedings of the 2004 Conference on Human Factors in Computing Systems - CHI ’04, (pp. 319–326) ACM Press. https://doi.org/10.1145/985692.985733
  • Ahn, L. V., Liu, R., & Blum, M. (2006). Peekaboom: A game for locating objects in images. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI ’06, 55, ACM Press. https://doi.org/10.1145/1124772.1124782
  • Ahn, L. v., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). ReCAPTCHA: Human-based character recognition via web security measures. Science (New York, N.Y.).), 321 (5895), 1465–1468. https://doi.org/10.1126/science.1160379
  • Baird, H. S., & Popat, K. (2002). Human interactive proofs and document image analysis. In Daniel Lopresti, Jianying Hu, and Ramanujan Kashi (Eds.), Document analysis systems V (vol. 2423, pp. 507–518). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45869-7_54.
  • Baird, H. S., Allison, L., Coates, & Fateman, R. J. (2001). Pessimal print: A reverse turing test. In Proceedings of the 6th International Conference on Document Analysis and Recognition (pp. 1154–1158). IEEE Computer Society.
  • BBC News. (2007). PC stripper helps spam to spread. October 30, 2007. http://news.bbc.co.uk/2/hi/technology/7067962.stm.
  • Benjamin, W. (2008). The work of art in the age of its technological reproducibility, and other writings on media. Harvard University Press.
  • Bourdieu, P. (1984). Distinction: A social critique of the judgement of taste. Harvard University Press.
  • boyd, d. (2018). Did media literacy backfire? Points (Data & Society) (blog). March 16, 2018. https://points.datasociety.net/did-media-literacy-backfire-7418c084d88d.
  • Brunton, F. (2013). SPAM: A shadow history of the internet. Infrastructures. MIT Press.
  • Burrell, J. (2018). Thinking relationally about digital inequality in rural regions of the U.S. First Monday, 23 (6). https://doi.org/10.5210/fm.v23i6.8376.
  • Cardon, D., Cointet, J.-P., & Mazières, A. (2018). Neurons Spike Back (La Revanche Des Neurones: L’invention Des Machines Inductives et La Controverse de l’intelligence Artificielle). Réseaux, n° 211 (5), 173. https://doi.org/10.3917/res.211.0173
  • Center, P. A. R. (2003). Welcome to PARC’s CAPTCHAs. CAPTCHA - History. February 28, 2003. https://web.archive.org/web/20030407203015/http://www2.parc.com/istl/projects/captcha/history.htm.
  • Chew, M., & Baird, H. S. (2003). BaffleText: A human interactive proof. In Tapas Kanungo, Elisa H. Barney Smith, Jianying Hu, and Paul B. Kantor (Eds.), Proceedings of document recognition and retrieval X (vol. 5010, pp. 305–316). https://doi.org/10.1117/12.479682
  • Chew, M., & J. D. Tygar. (2004). Image recognition CAPTCHAs. In Kan Zhang and Yuliang Zheng (Eds.), Information security (vol. 3225, pp. 268–279). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-30144-8_23.
  • Cordell, R. (2017). Q i-Jtb the Raven. Book History, 20 (1), 188–225. https://doi.org/10.1353/bh.2017.0006
  • Danchev, D. (2008). Inside India’s CAPTCHA solving economy. ZDNet (blog). August 29, 2008. https://www.zdnet.com/article/inside-indias-captcha-solving-economy/.
  • Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., & Fei-Fei, L. (2009). ImageNet: A large-scale hierarchical image database [Paper presentation]. 2009 IEEE Conference on Computer Vision and Pattern Recognition, 248–55. https://doi.org/10.1109/CVPR.2009.5206848
  • Doctorow, C. (2004). Solving and creating captchas with free porn. Boing Boing (blog). May 8, 2004. https://boingboing.net/2004/01/27/solving-and-creating.html.
  • Drucker, J. (2011). Humanities approaches to graphical display. Digital Humanities Quarterly, 005 (1). http://www.digitalhumanities.org/dhq/vol/5/1/000091/000091.html.
  • Drucker, J. (2014). Graphesis: Visual forms of knowledge production. Harvard University Press.
  • Galloway, A. (2013). The poverty of philosophy: Realism and post-fordism. Critical Inquiry, 39 (2), 347–366. https://doi.org/10.1086/668529.
  • Gugliotta, G. (2011). Captchas have us deciphering old text through woozy web clues. The New York Times, March 2,82,011 sec. Science. https://www.nytimes.com/2011/03/29/science/29recaptcha.html.
  • Hacking, I. (1983). Representing and intervening: Introductory topics in the philosophy of natural science. Cambridge University Press.
  • Hopper, N., & Blum, M. (2001). Secure human identification protocols. In Colin Boyd (Ed.), Advances in cryptology — Asiacrypt 2001 (vol. 2248, pp. 52–66). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45682-1_4.
  • Hopper, N., Langford, J., & von Ahn, L. (2002). Provably secure steganography. In CRYPTO 2002: Advances in Cryptology. https://doi.org/10.1007/3-540-45708-9_6.
  • Invisible ReCAPTCHA. (2020). n.d. Google Developers. Accessed January 30, https://developers.google.com/recaptcha/docs/invisible.
  • Irani, L. (2015). Difference and dependence among digital workers: The case of Amazon mechanical Turk. South Atlantic Quarterly, 114 (1), 225–234. https://doi.org/10.1215/00382876-2831665
  • Koopman, C. (2019). How we became our data: A genealogy of the informational person. University of Chicago Press.
  • Korpela, E., Werthimer, D., Anderson, D., Cobb, J., & Leboisky, M. (2001). SETI@home-massively distributed computing for SETI. Computing in Science & Engineering, 3 (1), 78–83. https://doi.org/10.1109/5992.895191
  • Lazer, D., Baum, M., & Mele, N. (2017). Combating fake news: An agenda for research and action. Harvard Kennedy School. https://shorensteincenter.org/combating-fake-news-agenda-for-research/.
  • Lillibridge, M., Abadi, M., Bharat, K., & Broder, A. (2001). Method for selectively restricting access to computer systems. US6, 195. 698B1, filed April 13, (1998), issued February 27, 2001.
  • May, M. (2003). Inaccessibility of CAPTCHA: Alternatives to Visual Turing Tests on the Web. Accessible Platform Architectures. WAI Protocols and Formats Working Group. https://www.w3.org/TR/turingtest/#the-accessibility-challenge.
  • Mori, G., & Malik, J. (2003). Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA [Paper presentation]. 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Madison, WI, USA. In, 2003, Proceedings, I-134-I–141 IEEE Comput. Soc. https://doi.org/10.1109/CVPR.2003.1211347
  • Motoyama, M. (2011). Understanding the role of outsourced labor in web service abuse [Dissertation]. University of California. https://escholarship.org/content/qt87s441sw/qt87s441sw.
  • Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G. M., & Savage, S. (2010). Re: CAPTCHAs – Understanding CAPTCHA-solving services in an economic context. Proceedings of the USENIX Security.
  • Naor, M. (1996). Verification of a human in the loop or identifications via the turing test. Preliminary draft. Weizmann Institute of Science.
  • Naor, M., & Shamir, A. (1995). Visual cryptography. In Alfredo De Santis (ed.), Advances in cryptology — EUROCRYPT’94. Lecture notes in computer science (pp. 1–12).Springer. https://doi.org/10.1007/BFb0053419.
  • Parikka, J., & Sampson, T. D. (2009). The spam book: On viruses, porn, and other anomalies from the dark side of digital culture. Hampton Press.
  • Peterson, G. D., & Chamberlain, R. D. (1995). Stealing cycles: Can we get along? [Paper presentation]. Twenty-Eighth Annual Hawaii International Conference on System Sciences, In Proceedings of the, 2:422–31 vol. 2. https://doi.org/10.1109/HICSS.1995.375516
  • Sekula, A. (1986). The body and the archive. October, 39, 3–64. https://doi.org/10.2307/778312
  • Shet, V. (2013). ReCAPTCHA just got easier (but only if you’re human). Google Online Security Blog (blog). October 25, 2013. https://security.googleblog.com/2013/10/recaptcha-just-got-easier-but-only-if.html.
  • Shet, V. (2014). Are you a robot? Introducing ‘No CAPTCHA ReCAPTCHA. Google Online Security Blog (blog). December 3, 2014. https://security.googleblog.com/2014/12/are-you-robot-introducing-no-captcha.html.
  • Shoemaker, T. (2019). Error aligned. Textual Cultures, 12 (1), 155–182. https://doi.org/10.14434/textual.v12i1.27153
  • Stone, B. (2008). Breaking google captchas for some extra cash. Bits Blog (blog). March 13, 2008. https://bits.blogs.nytimes.com/2008/03/13/breaking-google-captchas-for-3-a-day/.
  • Turing, A. (1950). Computing machinery and intelligence. Mind, LIX (236), 433–460. https://doi.org/10.1093/mind/LIX.236.433
  • Wikipedia. (n.d.). CAPTCHA. Accessed October 5, 2020. https://en.wikipedia.org/wiki/CAPTCHA.
  • Winston, B. (1987). A mirror for brunelleschi. Daedalus, 116(3), 187–201.
  • Wyszomierski, M. (2010). Protect your site from spammers with ReCAPTCHA. Official Google Webmaster Central Blog (blog). January 26, 2010. https://webmasters.googleblog.com/2010/01/protect-your-site-from-spammers-with.html.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.