Export file:


  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text


  • Citation Only
  • Citation and Abstract

CAPTCHA recognition based on deep convolutional neural network

College of Computer Science and Information Technology, Central South University of Forestry and Technology, 498 shaoshan S Rd, Changsha, 410004, China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Aiming at the problems of low efficiency and poor accuracy of traditional CAPTCHA recognition methods, we have proposed a more efficient way based on deep convolutional neural network (CNN). The Dense Convolutional Network (DenseNet) has shown excellent classification performance which adopts cross-layer connection. Not only it effectively alleviates the vanishing-gradient problem, but also dramatically reduce the number of parameters. However, it also has caused great memory consumption. So we improve and construct a new DenseNet for CAPTCHA recognition (DFCR). Firstly, we reduce the number of convolutional blocks and build corresponding classifiers for different types of CAPTCHA images. Secondly, we input the CAPTCHA images of TFrecords format into the DFCR for model training. Finally, we test the Chinese or English CAPTCHAs experimentally with different numbers of characters. Experiments show that the new network not only keeps the primary performance advantages of the DenseNets but also effectively reduces the memory consumption. Furthermore, the recognition accuracy of CAPTCHA with the background noise and character adhesion is above 99.9%.
  Article Metrics


1. L. Wang, R. Zhang and D. Yin, Image verification code identification of hyphen, Comput. Eng. Appl., 28 (2011), 150–153.

2. J. Yan and A. S. E. Ahmad, A low-cost attack on a Microsoft CAPTCHA, Proceedings of the ACM Conference on Computer and Communications Security, (2008), 543–554.

3. L. Zhang, S. W. Huang, Z. X. Shi, et al., CAPTCHA recognition method based on LSTM RNN, Pattern Recogn., 1 (2011), 40–47.

4. L. Yin, D. Yin and R. Zhang, A recognition method of twisted and pasted character verification code, Pattern Recogn., 3 (2014), 235–241.

5. H. Li, J. H. Qin and X. Y. Xiang, An efficient image matching algorithm based on adaptive threshold and RANSAC, IEEE Access, 6 (2018), 66963–66971.

6. L.Y. Xiang, Y. Li and W. Hao, Reversible natural language watermarking using synonym substitution and arithmetic coding, Comput. Mat. Con., 3 (2018), 541–559.

7. L.Y. Xiang, X. B. Shen, J. H. Qin, et al., Discrete multi-graph hashing for large-scale visual search, Neur. Process. Lett., 49 (2019), 1055–1069.

8. Y. L. Liu, H. Peng and J. Wang, Verifiable diversity ranking search over encrypted outsourced Data, Comput. Mater. Con., 1 (2018), 37–57.

9. H. T. Tang, Verification code recognition model and algorithm of self-organizing incremental neural network, MA thesis, Guangdong University of technology, 2016.

10. Y. Wang, Y. Q. Xu and Y. B. Peng, Verification code identification of xiaonei network based on KNN technology, Comput. Moder., 2 (2017),93–97.

11. Y. S. Chen and Y. Zhang, Design and implementation of character-based image verification code recognition algorithm, Comput. K. T., 1 (2017),190–192.

12. Y. Wang and M. Lu, A self-adaptive algorithm to defeat text-based CAPTCHA, IEEE International Conference on Industrial Technology, (2016), 720–725.

13. W. T. Ma, J. H. Qin, X. Y. Xiang, et al., Adaptive median filtering algorithm based on divide and conquer and its application in CAPTCHA recognition, Comput. Mater. Con., 58 (2019), 665–677.

14. J. W. Wang, T. Li and X. Y. Luo, Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, IEEE T. Circ. Syst. Vid., 1 (2018), 1.

15. X. W. Liu, L. Wang, Jian Zhang, et al., Global and local structure preservation for feature selection, IEEE T. Neur. Net. Lear., 25 (2014), 1083–1095.

16. J. H. Qin, H. Li, X. Y. Xiang, et al., An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing, IEEE Access, 17 (2019), 24626–24633.

17. M. L. Wen, X. Zhao, M. Q. Cai, et al., End-to-end verification code recognition based on deep learning, Wireless Inter. technol., 14 (2017), 85–86.

18. Y. Peng, Research on verification code recognition based on deep convolutional neural network, Commu. world, 1 (2018), 66–67.

19. Z. Zhang, S. F. Wang and L. Dong, Verification code recognition based on deep learning, J. hubei univ. technol., 2 (2018), 5–11.

20. S. R. Zhou, W. L. Liang, J. G. Li, et al., Improved VGG model for road traffic sign recognition, Comput. Mat. Con., 1 (2018), 11–24.

21. W. Fang, F. H. Zhang and V. S. Sheng, A method for improving CNN-based image recognition using DCGAN, Comput. Mat. Con., 1 (2018), 167–178.

22. Y. P. Lv, F. P. Cai, D. Z. Lin, et al., Chinese character CAPTCHA recognition based on convolution-neural network, Proceedings of the IEEE Congress on Evolutionary Computation, (2016), 4854–4859.

23. G. Garg and C. Pollett, Neural network CAPTCHA crackers, Proceedings of the Future Technologies Conference, (2016), 853–861.

24. Y. H. Shen, R. G. Ji and D. L. Cao, Hacking Chinese touclick CAPTCHA by multiscale corner struc-ture model with fast pattern matching, Proceedings of the ACM International Conference on Multimedia, (2014), 853–856.

25. W. Fan, J. G. Han, Fan Gou, et al., Chinese character verification code recognition by convolutional neural network, Comput. Eng. Appl., 3 (2018), 160–165.

26. G. Huang, Z. Liu, L. V. D Maaten, et al., Densely connected convolutional networks, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, (2017), 2261–2269.

27. N. Ma, X. Zhang, H. T. Zheng, et al., ShuffleNet V2: practical guidelines for efficient CNN architecture design, Computer Vision and Pattern Recognition, preprint, arXiv:1807.11164.

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Article outline

Show full outline
Copyright © AIMS Press All Rights Reserved