|Table of Contents|

Recognition and Improvement of Identifying Code(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2009年02期
Page:
84-88
Research Field:
Publishing date:

Info

Title:
Recognition and Improvement of Identifying Code
Author(s):
Huang SaipingXu Ming
School of Computer Engineering,Nanjing Institute of Technology,Nanjing 211167,China
Keywords:
network secur ity identify ing code recogn ition im provem ent
PACS:
TP393.08
DOI:
-
Abstract:
In a llusion to thew ide use of identify ing codes in internet security and identification authentication, the paper d iscusses the func tiona l pr inc iples o f identify ing codes and commonly used w ay s o f recognizing identify ing codes. Seg m enta tion and recogn ition exper im ents of identify ing codes arem ade. The experim ental results ind icated tha t the ex isting identify ing codes are no t effective in ensu ring the system security. An improved m ethod is propo sed in th is paper. Its prog ram is sim ple and effec tive, and the new ly gene rated identify ing codes can increase the d ifficulty o f recogn ition and decrease the accuracy o f dec ipherm ent. Thus, it has a good value of prom otion. Som e suggestions on identifying code design ing are g iven in the end of th is paper.

References:

[ 1] 吉治钢. 基于验证码破解的HTTP攻击原理与防范[ J]. 计算机工程, 2006, 32( 20): 170-172.
Ji Zh igang. Princ ip les and prevention o f HTTP attacks based on identify ing code recognizition [ J]. Computer Eng ineer ing,
2006, 32( 20): 170-172. ( in Ch inese)
[ 2] 苏磊, 马良. 形状上下文在验证码识别中的应用[ J]. 人工智能, 2007, 23( 2): 252-254.
Su Le ,iM a L iang. App lica tion o f shape contex t in break ing v isua l CAPTCHA[ J]. A rtific ia l Inte lligence, 2007, 23( 2): 252-
254. ( in Ch inese)
[ 3] 童情. Captcha[ EB /OL]. ( 2008-06-06) [ 2009-01-01]. http: / /ba ike. baidu. com /v iew /538168. h tm
Tong Q ing. Captcha[ EB /OL]. ( 2008-06-06) [ 2009-01-01] . http: / /ba ike. ba idu. com / v iew /538168. htm ( in Ch inese)
[ 4] Lu is von Ahn, M anue l B lum, John Langford. dTe lling hum ans and computers apart automa tica lly[ J]. Comm un ica tions of the
ACM, 2004, 47( 2): 57-60
[ 5] 陈珊. 基于C#验证码的实现[ J] . 网络安全技术与应用, 2007( 5): 58-59.
Chen Shan. Rea liza tion o f identifying code based on C# [ J]. Ne tw ork Security Techno logy and Application, 2007( 5): 58-59.
( in Chinese)
[ 6] 洪伟铭. 验证码的原理及实现方法[ J]. 武汉科技学院学报, 2007, 20( 4): 17-19.
H ongWe im ing. Pr incile and rea lization of validation code[ J]. Journa l ofWuhan University o f Sc ience and Eng ineering, 2007,
20( 4): 17-19. ( in Ch inese)
[ 7] 吴小艳, 王维庆, 杨春祥, 等. 基于模板匹配的数字图像识别算法[ J]. 兵工自动化, 2005( 6) : 98-101.
W u X iaoyan,W ang W eiqing, Yang Chunx iang, et a.l Recogn ition a lgor ithm for dig ital image based on tem plate m a tch [ J].
O rdnance Industry Autom ation, 2005( 6): 98-101. ( in Ch inese)
[ 8] 贾婧, 葛万成, 陈康力, 等. 基于轮廓结构和统计特征的字符识别研究[ J]. 沈阳师范大学学报: 自然科学版, 2006, 24
( 1): 43-46.
Jia Jing, GeW ancheng, Chen Kang l,i et a.l Charac ter recogn ition based on structural and statistica l features[ J]. Journal o f
Shenyang No rm al University: Natural Science Ed ition, 2006, 24( 1): 43-46. ( in Ch inese)
[ 9] 贾少锐, 李丽宏, 安庆宾, 等. BP 神经网络算法在字符识别中的应用[ J]. 科技情报开发与经济, 2007, 17 ( 2):
167-169.
Jia Shaoru,i L i L ihong, An Q ingb in, et a.l The application of BP neura l network a lgor ithm in the cha racter recognition [ J].
Sc i-Tech Info rma tion Deve lopm ent and Economy, 2007, 17( 2): 167-169. ( in Ch inese)

Memo

Memo:
-
Last Update: 2013-04-23