Skip to main content

Human Information Processing (HIP)

  • Chapter
  • First Online:
The CAPTCHA: Perspectives and Challenges

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 162))

  • 609 Accesses

Abstract

This chapter explains the elements of human interactive proof. As a starting point, it uses a set of protocols which are able to authenticate humans compared to a computer. Furthermore, it defines all necessary properties that the human interaction proof should satisfy. Also, it determines a minimal human success rate of passing the given set of protocols. At the end, it proposes some applications where it can be used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hopper N (2001) Security and complexity aspects of human interactive proofs. In: Proceedings of the first HIP conference, pp 1–4

    Google Scholar 

  2. von Ahn L, Blum M, Hopper NJ, Langford J (2003) CAPTCHA: using hard AI problems for security. In Proceedings of advances in cryptology. Eurocrypt 2003. LNCS, vol 2656. Springer, Berlin, pp 294–311

    Google Scholar 

  3. Hopper NJ, Manuel B (2001) Secure human identification protocols. In: Boyd C (ed) Advances in cryptology—ASIACRYPT. LNCS, vol 2248. Springer, Berlin

    Chapter  Google Scholar 

  4. Basso A, Bergadano F. (2010) Anti-bot strategies based on human interactive proofs. In Stavroulakis P, Stamp M, eds: Handbook of information and communication security, Springer

    Google Scholar 

  5. Dhamija R, Tygar J D (2005) Phish and HIPs: human interactive proofs to detect phishing attacks. In: Baird H, Lopresti D (eds) Proceedings of human interactive proofs: second international workshop (HIP 2005). Springer, Berlin, pp 127–141

    Chapter  Google Scholar 

  6. First Workshop on Human Interactive Proofs (2002). Available http://www.aladdin.cs.cmu.edu/hips/events/

  7. Chellapilla K, Simard P (2004) Using machine learning to break visual human interaction proofs (HIPs). Advances in neural information processing systems 17. Neural information processing systems (NIPS ‘2004). MIT Press

    Google Scholar 

  8. Mori G, Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition, 18–20 June 2003, Madison, Wisconsin, pp 134–141

    Google Scholar 

  9. Goodman JT, Rounthwaite R (2004) Stopping outgoing spam. In: Proceedings of the 5th ACM conference on electronic commerce, 17–20 May 2004, New York, NY, USA

    Google Scholar 

  10. Chellapilla K, Larson K, Simard P, Czerwinski M (2005) Designing human friendly human interaction proofs (HIPs). In: Proceedings of the SIGCHI conference on human factors in computing systems (CHI ‘05). ACM, New York, pp 711–720

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessia Amelio .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Brodić, D., Amelio, A. (2020). Human Information Processing (HIP). In: The CAPTCHA: Perspectives and Challenges. Smart Innovation, Systems and Technologies, vol 162. Springer, Cham. https://doi.org/10.1007/978-3-030-29345-1_3

Download citation

Publish with us

Policies and ethics