期刊文献+

Design and Implementation of Verification Code Identification Based on Anisotropic Heat Kernel 被引量:2

Design and Implementation of Verification Code Identification Based on Anisotropic Heat Kernel
下载PDF
导出
摘要 Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site. Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site.
出处 《China Communications》 SCIE CSCD 2016年第1期100-112,共13页 中国通信(英文版)
基金 The national natural science foundation(61273290,61373147) Xiamen Scientific Plan Project(2014S0048,3502Z20123037) Fujian Scientific Plan Project(2013HZ0004-1) FuJian provincial education office A-class project(-JA13238)
关键词 各向异性 识别方法 验证码 设计 百度网站 测试系统 识别算法 网络营销 verification code image recognition data mining scale space anisotropic heat kernel
  • 相关文献

参考文献1

二级参考文献19

  • 1Microsoft company network working group. Extensible Authentication Protocol (EAP) Key Management Framework [EB/OL]. [2012-04-01]. http://technet.microsofl.com/zh-cn/ library/cc268397.
  • 2Rand M, Kenton G, Michael N, et al. Microsoft Exchange Server 2003 Unleashed [M]. Chittagong: SAMS Press, 2003: 7-13.
  • 3Federal Financial Institutions Examination Council. Authentication in an internet banking environment, information technology examination handbook [EB/OL]. [2012-04-01]. http: //www.Jfiec.gov Authentication/.
  • 4Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems [C]//Proceedings of the IEEE Canadian Conference on Electrical Computer Engineering, Vancouver: IEEE Press, 2002:171-178.
  • 5The Globus Security Team. Globus toolkit version 4 grid security infrastructure: A standards perspective [EB/OL]. [2012-04-01 ]. http://globus.org/toolkit/docs/4.0/security/GT4-GSI- Overview.pdf .
  • 6Novotny J, Tuecke S, Welch V. An online credential repository for the grid: MyProxy [EB/OL]. [2012-04-01]. http:// www. globus. org/alliance/pub lications/myproxy.pdf.
  • 7Trust Computing Group. TCG main specification Version 1.1b [EB/OL]. [2012-04-02]. http://wwww.trustedcomputinggroup. org/home.
  • 8Abwajyj H. Fault tolerant scheduling policy for grid computing systems [C]//Proceedings of the 18th IEEE International Parallel and Dist Ributed Processing Symposium. Los Alamitos: IEEE Computer Society Press, 2004: 238-244.
  • 9Abdul A, Hailes S. Supporting trust in virtual communities [C] //Proceedings of the Hawaii International Conference on System Sciences, Maui IEEE Computer Society Press, 2000: 239-248.
  • 10Liu Lizhao, Hu Xiaojing, Zhang Tianhua, et al. A real-time 3D collision detection encryption algorithm based on improved RC5 [J]. Advanced Science Letters, 2011, 4(4): 2708-2712.

共引文献1

同被引文献24

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部