1. 程式人生 > >The application of image processing in verification code recognization

The application of image processing in verification code recognization

Picture processing has a wide range of applications in daily life, image recognization is one of them. From verification code recognization to face recognization, there is much knowledge related to image processing. Now, I would like to roughly introduce my understanding about verification code recognization.
To indentity the verifization code recognization, we need to select enough material. And most of the material comes from the browser’s grab packages. Based on my experence, I strongly recommend using Google Chrome,. After grabbing packages, we can start requesting the interface to get the image and save it to the local disk, it is important to divided these pictures into training sets and test sets, which make a difference in the following steps. The next step is image preprocessing, the pictures obatined should be binarized, in other word, we need to convert the RGB graph (RGB is obtained by changing the red, green and blue color channels and superimposing them on each other) into grayscale graph(grayscale graph has a logarithmically graded image between white and black) and change it to the binary graph(Binary image refers to the image of each pixel only two possible values or gray level state),according to a certain threshold value (a kind of special value in picture processing) , which is beneficial to the recognization. It is known that Internal system or external environment will produce noise, therefore, in order to ensure the accuracy of recognition, we have to remove these noises reasonably. How to denoise is a deep topic, there are many methods such as gaussian low-pass filtering and non-local mean algorithm, but I have not understood them completely. Hence, what I am going to show you here is a slightly simpler algorithm that I learned online, which is called outlier testing method, to be specific, we need to test the number of black spots in the grid of the Sudoku. In general, the number of black points in a noise-filled Sudoku is small, so we can then go through the process of testing each of the nine grids to remove these outliers. In the next stage, all the resulting binary graphs should be divided into single characters, and we need to judge these characters divided by our sense of classification, which is helpful for machine learning. Then it is siginficant to unify the pixel size of each character that we have divided, which is convenient for picture processing. This step might involve scaling the image, and I will not introuduce the details here.
Then there is a crucial step, looking for eigenvectors. It is obviously not advisable to find eigenvector directly from the values of all the pixels because the data would be too big, which is hard for us to perform. To simplify the data, we can obtain the eigenvectors by calculating the black points per row and per column, and it can greatly reduce the complexity of the calculation. In other image recognition, we should reasonably reduce the dimension of eigenvectors without reducing the accuracy, which facilitates the operation of the program, and this is one of the most important step in image processing. After selecting the eigenvectors, we can start the simulation training, and SVM training model is used to train files with tagged features. The accuracy rate will gradually stabilize after continuous training. Of course, we can not just check the training set, because that is the source that we take an advantage of to do machine learning, that is to say when we test, we are going to use the test set that we have divided up before.
The whole process we can use MATLAB, python, LIBSVM and other programming approachs to achieve our purpose. In the later stage, better efficiency can be achieved through optimization including software hierarchy optimization and hardware hierarchy optimization.
In conclusion, what I have introduced is the most basic verification code recognition with regular arrangement of characters and other limiations, the more complex cases require better algorithms instead of what I have talked about.

相關推薦

The application of image processing in verification code recognization

Picture processing has a wide range of applications in daily life, image recognization is one of them. From verification code recog

The Application of Stack in Expression Calculation

代寫Expression Calculation作業、代做C/C++程式設計作業、C/C++語言作業除錯、代寫infix作業The Final Laboratory Reports1. TitleThe Application of Stack in Expression Calculation2. Intr

論文筆記《The application of two-level attention models in deep convolutional neural network for FGVC》

這篇文章是2015年的,作者使用提出了兩級注意力的方法,來進行細粒度分類。 以鳥類分類為例。作者在object-level和part-level兩個級別分別對鳥進行分類,將得到的分數相加綜合後得到最後的分類結果。 上圖是鳥分類在object-level的一個流程圖,先用select

How Blockchain can be used in the application of AI

Blockchain and artificial intelligence are highly converging technologies in the today's tech world. The combined use of these two technologies is offering

Estimating the number of receiving nodes in 802.11 networks via machine learning

當前 網絡通信 works 存儲 bsp ron 測量 分析 輸入 來源:IEEE International Conference on Communications 作者:Matteo Maria 年份:2016 摘要: 現如今很多移動設備都配有多個無線接口,比如藍牙

上傳文件報錯:Warning: POST Content-Length of 9443117 bytes exceeds the limit of 8388608 bytes in Unknown on line 0

The lin clas php 但是 exce 小文件 情況 lan 只需在php.ini中設置: upload_max_filesize = 1000M; post_max_size = 1000M;還有一種情況就是小文件可以上傳成功,但是大文件上傳,$_FILES

Application of deep learning in Industrial area

Application of deep learning in Industrial area https://www.vision-systems.com/articles/print/volume-22/issue-10/departments/technology-trends/machi

Thoughts on the Application of Radar Technology to the Improvement of Street Light System

Abstract: Street lights are everywhere in people’s daily lives. But street lights can sometimes cause problems for people. First of all, long-term

Radar Guidance Technology and the Solution of Social Problems in China

Radar Guidance Technology and the Solution of Social Problems in China Radar Guidance Technology of Guiding Missile to Target by Radar Guidance

Warning: POST Content-Length of 16767309 bytes exceeds the limit of 8388608 bytes in Unknown on line

使用xampp和WordPress,上傳新主題時報錯。 錯誤資訊: Warning: POST Content-Length of 16767309 bytes exceeds the limit of 8388608 bytes in Unknown on line&n

The Application of Eigenvectors and Eigenvalues to Differential Equations

文章目錄 微分方程的數學背景 $du/dt=Au$的解 二階微分方程 矩陣A的指數次冪($e^{At}$) 微分方程的數學背景 二階常係數齊次線性微分方程:

android studio方法總數超過64K報錯Error:The number of method references in a .dex file cannot exceed 64K.

開發中記錄點滴 1.問題描述 Error:The number of method references in a .dex file cannot exceed 64K. Error:Execution failed for task ':app:transformC

POST Content-Length of 65077906 bytes exceeds the limit of 52428800 bytes in Unknown on line 0

PHP上傳時,當上傳檔案大小超過php.ini中配置閾值時,會出現上面警告,從$_FILES中無法取到上傳的檔案資訊。 解決辦法 ① 開啟php.ini,修改如下兩行: # 上傳檔案的最大值 upload_max_filesize = 100M # post提交時最大資料大小

影象的梯度(The Gradient of Image

一、影象梯度的定義 影象函式f(x,y)在點(x,y)的梯度是一個具有大小和方向的向量,設為Gx 和 Gy 分別表示x方向和y方向的梯度,這個梯度的向量可以表示為: 這個向量的幅度為 方向角為: 對於數字影象而言,相當於對二維離散函式求梯度,如下: G(x,y)

Error:The number of method references in a .dex file cannot exceed 64K.

收到一封google admob 寄來的信: 說要增加下面的code, 廣告在過了 2016-09-15 才會繼續放送: apply plugin: ‘com.android.application’ … dependencies {     compile ‘com.google.android.gms

3 Questions: Historian Caley Horan on the rise of private insurance in the U.S.

Science and technology are essential tools for innovation, and to reap their full potential, we also need to articulate and solve the many aspects of today

Researchers have discovered how to slow aging: Natural product found to reduce the level of damaged cells in the body, caused by

As people age, they accumulate damaged cells. When the cells get to a certain level of damage they go through an aging process of their own, called cellul

The Future of Alternatives: AI in Alternatives

As the alternative assets industry continues to grow, Preqin is launching an initiative examining the Future of Alternatives. In conjunction with key indus

Urbanization and humidity shape the intensity of influenza epidemics in U.S. cities

Influenza virus strikes communities in northern latitudes during winter, straining health care provision almost to the breaking point. Change in environmen

Five Predictions On The Impacts Of Conversational AI In The Coming Year

Take a look at how technology has changed companies in the 21st century. First, brands sought an online presence. Then, they found an e-commerce presence.