Verification Code Recognition Based on Active and Deep Learning

被引:0
作者
Xu, Dongliang [1 ]
Wang, Bailing [2 ]
Du, XiaoJiang [3 ]
Zhu, Xiaoyan [4 ]
Guan, Zhitao [5 ]
Yu, Xiaoyan [6 ]
Liu, Jingyu [7 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Weihai, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Weihai, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Xidian Univ, Comp Informat Ctr, Xian, Shaanxi, Peoples R China
[5] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[6] Capital Normal Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[7] Intermediate Peoples Court, Comp Informat Ctr, Weihai, Peoples R China
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) | 2019年
关键词
Verification code recognition; convolutional neural network; feature learning; KEY MANAGEMENT SCHEME; CAPTCHA; DESIGN;
D O I
10.1109/iccnc.2019.8685560
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A verification code is an automated test method used to distinguish between humans and computers. Humans can easily identify verification codes, whereas machines cannot. With the development of convolutional neural networks, automatically recognizing a verification code is now possible for machines. However, the advantages of convolutional neural networks depend on the data used by the training classifier, particularly the size of the training set. Therefore, identifying a verification code using a convolutional neural network is difficult when training data are insufficient. This study proposes an active and deep learning strategy to obtain new training data on a special verification code set without manual intervention. A feature learning model for a scene with less training data is presented in this work, and the verification code is identified by the designed convolutional neural network. Experiments show that the method can considerably improve the recognition accuracy of a neural network when the amount of initial training data is small.
引用
收藏
页码:453 / 456
页数:4
相关论文
共 23 条
  • [1] [Anonymous], P 2016 ACM SIGDA INT
  • [2] [Anonymous], CVPR
  • [3] [Anonymous], COMP VIS PATT REC 20
  • [4] [Anonymous], P IEEE INFOCOM 2013
  • [5] [Anonymous], B SCI TECHNOLOGY
  • [6] [Anonymous], WIRELESS INTERNET TE
  • [7] Bai JF, 2014, INT CONF ACOUST SPEE, DOI 10.1109/ICASSP.2014.6853823
  • [8] A neural probabilistic language model
    Bengio, Y
    Ducharme, R
    Vincent, P
    Jauvin, C
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (06) : 1137 - 1155
  • [9] A lightweight live memory forensic approach based on hardware virtualization
    Cheng, Yingxin
    Fu, Xiao
    Du, Xiaojiang
    Luo, Bin
    Guizani, Mohsen
    [J]. INFORMATION SCIENCES, 2017, 379 : 23 - 41
  • [10] An effective key management scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hslao-Hwa
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 24 - 34