[1]闫懋申,冯嘉礼.基于属性网格计算的验证码识别研究[J].计算机技术与发展,2013,(01):34-36.
 YAN Mao-shen,FENG Jia-li.Study on Recognition of CAPTCHA Based on Attribute Grid Computing[J].,2013,(01):34-36.
点击复制

基于属性网格计算的验证码识别研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年01期
页码:
34-36
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Study on Recognition of CAPTCHA Based on Attribute Grid Computing
文章编号:
1673-629X(2013)01-0034-03
作者:
闫懋申冯嘉礼
上海海事大学 信息工程学院
Author(s):
YAN Mao-shenFENG Jia-li
关键词:
验证码识别网络安全属性网格计算器定性映射
Keywords:
CAPTCHA recognitionWeb securityattribute grid computerqualitative mapping
文献标志码:
A
摘要:
文中旨在基于对属性网格计算的研究基础上,提出一种新的验证码识别研究方式,并通过实验验证该方法的可行性.方法如下:在验证码识别之前,需要先进行预处理,其中包括:图像的灰度化、二值化、去噪、分割以及归一化.在识别部分中,会用到属性网格计算器,这是一种基于定性映射的新型计算器.以对象的不同属性特征为维度,建立属性网格,并根据属性网格做出计算.首先对标准字符建立属性网格,然后在每次识别字符时,对识别字符的属性进行网格计算,并得出结果.实验结果成功率较高.该结果证明了该方法的可行性,同时表明了识别成功率与不同属性的权值分配有关
Abstract:
A new method is expected for CAPTCHA recognition in this paper,which is based on research on attribute grid computing,and the experiments show this method is feasible. There are several steps in the preprocessing of CAPTCHA,which include transforming im-age to grayscale image,image binarization,image denoising,image segmentation and normalization. In recognition part,use attribute grid computer,which is a kind of new computer based on qualitative mapping,build a attribute grid for object with its attributes and compute according to it. In this paper,build a attribute grid for standard characters,then,once need to recognize character,this grid can be used for computing and getting the results. The success rates of experiments are high,which verified the feasibility of this method,and also veified that the success rates of recognition are related with the allocation of the weights among different attributes

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(01):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(01):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(01):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(01):162.
[5]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(01):7.
[6]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(01):181.
[7]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(01):156.
[8]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(01):129.
[9]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(01):128.
[10]潘文婵 章韵.路由器访问控制列表在网络安全中的应用[J].计算机技术与发展,2010,(08):159.
 PAN Wen-chan,ZHANG Yun.Application of Access Control List on Router in Network Security[J].,2010,(01):159.

更新日期/Last Update: 1900-01-01