Advertisement

Recognizing the Adhesion Hollow Characters Based on the Closed Cutting Algorithm

  • Chunyong Yin
  • Kaiwen Zhu
  • Lian Xia
  • Jin Wang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

With the development of network security, CAPTCHA identification is becoming a hot research topic. In this paper, we study the adhesion hollow character in the CAPTCHA, and put forward a method to identify the hollow characters which are adhered to each other in the CAPTCHA. The method is based on the principle of virus invading cells, and uses the particle swarm algorithm to find the closed space and fill it. We determine the location of the character by the histogram of number of layers, and then recognize the characters that are cut out. Experimental results show that the proposed method can be effectively used to identify the hollow characters in the CAPTCHA, and the recognition rate is 30.1%.

Keywords

CAPTCHA Closure detection Shape context Bionics Recognition 

Notes

Acknowledgments

This work was funded by the National Natural Science Foundation of China (61772282, 61373134, and 61402234). It was also supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX17_0901) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET). We declare that we do not have any conflicts of interest to this work.

References

  1. 1.
    Yan, J., Ahmad, S.E.: Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 44–52 (2008)Google Scholar
  2. 2.
    Yin, L., et al.: A recognition method for distorted and merged text-based CAPTCHA. Pattern Recog. Artif. Intell. 27(3), 235–241 (2014)Google Scholar
  3. 3.
    Belongie, S., Jitendra, M., Jan, P.: Shape matching and object recognition using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 24(4), 509–522 (2002)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Chunyong Yin
    • 1
    • 2
    • 3
  • Kaiwen Zhu
    • 1
    • 2
    • 3
  • Lian Xia
    • 1
    • 2
    • 3
  • Jin Wang
    • 4
  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjingChina
  3. 3.Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment TechnologyNanjing University of Information Science and TechnologyNanjingChina
  4. 4.College of Information EngineeringYangzhou UniversityYangzhouChina

Personalised recommendations