KNN-based Verification Code Recognition Technology on Campus Network
(1.Wuhan Research Institute of Posts and Telecommunications, Wuhan 430074, China;
2.FiberHome Communications Science & Technology Development Co. Ltd., Nanjing 210019, China)
[1]Mori G, Malik J. Recognizing objects in adversarial clutt er: Breaking a visual CAPTCHA[C]// Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2003:134-141
[2]Moy G, Jones N, Harkless C, et al. Distortion estimation techniques in solving visual CAPTCHAs[C]// Proceedings of the 2004 IEEE Conference on Computer Vision and Pattern Recognition(CVPR’04). 2004:23-28.
[3]Chellapilla K, Simard P Y. Using machine learning to break visual human interaction proofs(HIPs)[J]. Advances in Neural Information Processing Systems, 2005:265-272.
[4]吕刚. 带干扰的验证码识别研究[D]. 杭州:浙江工业大学, 2010.
[5]李兴国,高炜. 基于滴水算法的验证码中粘连字符分割方法[J]. 计算机工程与应用, 2014,50(1):163-166.
[6]高炜. 字符型验证码的分割与识别技术研究[D]. 合肥:合肥工业大学, 2013.
[7]简献忠,曹树建,郭强. SOM聚类与Voronoi图在验证码字符分割中的应用[J]. 计算机应用研究, 2015,32(9):2857-2861.
[8]尹龙. 扭曲粘连字符验证码识别研究[D]. 合肥:中国科学技术大学, 2014.
[9]曲金山. 基于形状上下文的验证码识别研究[D]. 哈尔滨:哈尔滨工程大学, 2013.
[10]柳红刚. 字符扭曲粘连验证码识别技术研究[D]. 西安:西安电子科技大学, 2012.
[11]姚轶崭,陈利,王禹,等. 基于PIL滤波计算去噪算法的验证码识别[J]. 计算机安全, 2012(11):40-45.