文件名称:recognizer
介绍说明--下载内容均来自于网络,请自行研究使用
验证码识别与反识别
论文内容(1)、介绍了验证码发展的过程,按验证码上加的干扰不同,将验证码做了归类。 (2)、选取了一些比较有代表性的验证码做了识别的试验,介绍了添加纹理的验证码去除纹理的方法,根据试验的结果,论证了现有验证码不能很有效的保证系统的安全。同时分析了验证码在方便用户使用上的不足。 (3)、提出了两种新的验证码,新的验证码可以有效的防止系统被攻击,具有一定的推广价值-Code recognition and identification papers against the content of (1), describes the code development process, according to code, adding the interference is different from the classified code done. (2), selected some of the more representative of the identification code to do tests, introduced the code to add texture to remove the texture of the method, according to test results, demonstrating the existing code can not be very effective assurance system security. It analyzes the code on a user-friendly enough. (3), proposed two new code, new code can effectively prevent the system being attacked, with some promotional value of
论文内容(1)、介绍了验证码发展的过程,按验证码上加的干扰不同,将验证码做了归类。 (2)、选取了一些比较有代表性的验证码做了识别的试验,介绍了添加纹理的验证码去除纹理的方法,根据试验的结果,论证了现有验证码不能很有效的保证系统的安全。同时分析了验证码在方便用户使用上的不足。 (3)、提出了两种新的验证码,新的验证码可以有效的防止系统被攻击,具有一定的推广价值-Code recognition and identification papers against the content of (1), describes the code development process, according to code, adding the interference is different from the classified code done. (2), selected some of the more representative of the identification code to do tests, introduced the code to add texture to remove the texture of the method, according to test results, demonstrating the existing code can not be very effective assurance system security. It analyzes the code on a user-friendly enough. (3), proposed two new code, new code can effectively prevent the system being attacked, with some promotional value of
(系统自动生成,下载前可以参看下载内容)
下载文件列表
验证码的识别与反识别.nh