[1]巫愛雯(2011),影像驗證碼技術之研究,碩士論文,台中科技大學多媒體設計系(未出版) ,台中 。[2]莊凱婷(2013),以 Poker 為圖像驗證碼之設計研究,碩士論文,交通大學應用藝術研究所,新竹。[3]郭璟逸(2015),影像驗證碼應用於行動裝置之研究,碩士論文,臺中科技大學多媒體設計系,台中。[4]劉晉昇(2011),一個可自動增加驗證圖庫的圖像CAPTCHA系統,碩士論文,逢甲大學資訊工程所,台中。[5]賴怡靜(2002),以錯視為基礎之動態影像驗證碼研究,碩士論文,臺中科技大學多媒體設計系,台中。[6]L. V. Ahn, M. Blum, N. J. Hopper and J. Langford(2003), “CAPTCHA: Using hard AI problems for security,” In International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294-311.
[7]A. S. Almazyad, Y. Ahmad, and S. A. Kouchay(2011), “Multi-Modal CAPTCHA: A User Verification Scheme,” IEEE International Conference on Information Science and Applications, pp. 1-7.
[8]H. S. Baird, A. L. Coates and R. J. Fateman(2003), “Pessimalprint: A Reverse Turing Test,” Proceedings of 6th International Conferee on Document Analysis and Recognition, pp.154-158.
[9]J. Elson, J. R. Douceur, J. Howell and J. Saul(2007), “Asirra: a CAPTCHA that exploits interest-aligned manual image categorization,” In Proceedings of ACM CCS, pp.1-16.
[10]P. Golle(2008), “Machine learning attacks against the Asirra CAPTCHA,” In Proceedings of the 15th ACM conference on Computer and communications security, pp. 535-542.
[11]R. Gossweiler, M, Kamvar and S. Baluja (2009), “What's up CAPTCHA? a CAPTCHA based on image orientation,” In Proceedings of the 18th international conference on World wide web, pp.841-850.
[12]C. Higgins(2008), “CAPTCHA Variants: KittenAuth,” retrieved from: http://mentalfloss.com/article/18795/captcha-variants-kittenauth(2019/06/18)
[13]C. J. Lee, W. B. Lee, C. S. Liu, K. Ho and C. R. Dow(2012), “A Novel Friendly Image-Based CAPTCHA With Auto-Generation of Test Data,” In Proceedings of the 7th International Conference on Information Warfare and Security: ICIW, pp. 158.
[14]M. Mehrnejad, A. G. Bafghi and A. Harati, E. Toreini(2012), “SEIMCHA: a new semantic image CAPTCHA using geometric transformations,” The ISC International Journal of Information Security, pp.63-76.
[15]G. Mori and J. Malik(2003), “Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA,” IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp.1-8.
[16]G. Moy, N. Jones, C. Harkless and R. Potter(2004), “Distortion estimation techniques in solving visual CAPTCHAs,” In Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 1-6.
[17]C. Pope and K. Kaur(2005), “Is it human or computer? Defending e-commerce with captchas,” IT professional, pp.43-49.
[18]J. Thatcher(2009), “CAPTCHAs, CAPTCHAs everywhere,” retrieved from: https://jimthatcher.com/captchas.htm(2019/06/18)
[19]A. M. Turing(2009), “Computing machinery and intelligence,” In Parsing the Turing Test. Springer, Dordrecht, pp.23-65.
[20]J. Yan and A. E. Ahmad(2008), “Is cheap labour behind the scene? - Low-cost automated attacks on Yahoo CAPTCHAs,” Proceedings of the 15th ACM conference on Computer and communications security, pp.543-554.