Font Size: a A A

Design And Implementation Of The Digital Character Code Of Technology-based WEB

Posted on:2016-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:X N LiFull Text:PDF
GTID:2298330467999250Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet, Network infiltrated into almost everycorner of our lives, for exanple:Online ordering、shopping,、tickets、chat、play gamesand so on.People’s lives has become increasingly inseparable from thenetwork,Internet has become an important part of life.Because of the network, our lifehave become convenient in many ways.Anything has two sides,Internet is the same,Itis a always double-edged sword,On the one hand, Interne bring the benefits for people,On the other hand, it also Caused a lot of problems.Today, network security issuesgradually exposed in people’s lives and People increasingly pay attention toit.Network security issues are mainly a lot of malicious network activity with thenetwork speed and software updates keep coming. For example:1) When you use aspecific software, the software will be automatically registered for you, so that you donot have to be a registered compulsory registration of a large number of waste serverresources.2) Today, there are a lot of online voting contest, and some software canautomatically vote undermine the fairness of the game.3) There are a lot of softwaredoped inserted spam, pollute the network environment.4) There is a lot of leakedsome software user’s private information to the user’s personal information securitybrings danger. Exposed to a lot of these questions in life, serious pollution networkenvironment. Birth verification code technology is to solve a series of problems to.Most of these security issues in the use of code technology has been resolved. Nowthe verification code technology has to be applied in many ways. For example: intraffic, automatic license plate recognition; some text image digitization, the characterof the treatment; there is automatic entry to the file, and so on. Code technology as a traditional place in the subject field of identification mode, which is a branch ofidentifying patterns. Many experts in identification mode this a done a lot of hardwork, but unfortunately still can not have a universal identification code for allmethods. Many scholars at home and abroad are constantly devoted to research in thisarea.The main content of this article is to1) for the current network security issuesarise frequently, introduce the principle of the generation process and site verificationcode.2) the identification code of the study are introduced, respectively, from thepre-processing of the image, character recognition, segmentation and character partsto detail. This article describes the validation code image is about to introduce somesimple characters. This article describes the algorithm and also the introduction todigital characters. But on the current situation, the study of the code with thecontinuous recognition technology, code generation technology becomes more mature,more complex, has been developed to identify simple figures of the characters.Application code has become increasingly extensive. However, the code generationand recognition technology is still great development space, waiting to be exploited.
Keywords/Search Tags:Image processing, captcha, character matching, character segmentation
PDF Full Text Request
Related items