Export file:


  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text


  • Citation Only
  • Citation and Abstract

CAPTCHA recognition based on deep convolutional neural network

College of Computer Science and Information Technology, Central South University of Forestry and Technology, 498 shaoshan S Rd, Changsha, 410004, China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Aiming at the problems of low efficiency and poor accuracy of traditional CAPTCHA recognition methods, we have proposed a more efficient way based on deep convolutional neural network (CNN). The Dense Convolutional Network (DenseNet) has shown excellent classification performance which adopts cross-layer connection. Not only it effectively alleviates the vanishing-gradient problem, but also dramatically reduce the number of parameters. However, it also has caused great memory consumption. So we improve and construct a new DenseNet for CAPTCHA recognition (DFCR). Firstly, we reduce the number of convolutional blocks and build corresponding classifiers for different types of CAPTCHA images. Secondly, we input the CAPTCHA images of TFrecords format into the DFCR for model training. Finally, we test the Chinese or English CAPTCHAs experimentally with different numbers of characters. Experiments show that the new network not only keeps the primary performance advantages of the DenseNets but also effectively reduces the memory consumption. Furthermore, the recognition accuracy of CAPTCHA with the background noise and character adhesion is above 99.9%.
  Article Metrics

Keywords CAPTCHA recognition; deep learning; convolutional neural network; DenseNet; ResNet

Citation: Jing Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Nan Pan. CAPTCHA recognition based on deep convolutional neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 5851-5861. doi: 10.3934/mbe.2019292


  • 1. L. Wang, R. Zhang and D. Yin, Image verification code identification of hyphen, Comput. Eng. Appl., 28 (2011), 150–153.
  • 2. J. Yan and A. S. E. Ahmad, A low-cost attack on a Microsoft CAPTCHA, Proceedings of the ACM Conference on Computer and Communications Security, (2008), 543–554.
  • 3. L. Zhang, S. W. Huang, Z. X. Shi, et al., CAPTCHA recognition method based on LSTM RNN, Pattern Recogn., 1 (2011), 40–47.
  • 4. L. Yin, D. Yin and R. Zhang, A recognition method of twisted and pasted character verification code, Pattern Recogn., 3 (2014), 235–241.
  • 5. H. Li, J. H. Qin and X. Y. Xiang, An efficient image matching algorithm based on adaptive threshold and RANSAC, IEEE Access, 6 (2018), 66963–66971.
  • 6. L.Y. Xiang, Y. Li and W. Hao, Reversible natural language watermarking using synonym substitution and arithmetic coding, Comput. Mat. Con., 3 (2018), 541–559.
  • 7. L.Y. Xiang, X. B. Shen, J. H. Qin, et al., Discrete multi-graph hashing for large-scale visual search, Neur. Process. Lett., 49 (2019), 1055–1069.
  • 8. Y. L. Liu, H. Peng and J. Wang, Verifiable diversity ranking search over encrypted outsourced Data, Comput. Mater. Con., 1 (2018), 37–57.
  • 9. H. T. Tang, Verification code recognition model and algorithm of self-organizing incremental neural network, MA thesis, Guangdong University of technology, 2016.
  • 10. Y. Wang, Y. Q. Xu and Y. B. Peng, Verification code identification of xiaonei network based on KNN technology, Comput. Moder., 2 (2017),93–97.
  • 11. Y. S. Chen and Y. Zhang, Design and implementation of character-based image verification code recognition algorithm, Comput. K. T., 1 (2017),190–192.
  • 12. Y. Wang and M. Lu, A self-adaptive algorithm to defeat text-based CAPTCHA, IEEE International Conference on Industrial Technology, (2016), 720–725.
  • 13. W. T. Ma, J. H. Qin, X. Y. Xiang, et al., Adaptive median filtering algorithm based on divide and conquer and its application in CAPTCHA recognition, Comput. Mater. Con., 58 (2019), 665–677.
  • 14. J. W. Wang, T. Li and X. Y. Luo, Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, IEEE T. Circ. Syst. Vid., 1 (2018), 1.
  • 15. X. W. Liu, L. Wang, Jian Zhang, et al., Global and local structure preservation for feature selection, IEEE T. Neur. Net. Lear., 25 (2014), 1083–1095.
  • 16. J. H. Qin, H. Li, X. Y. Xiang, et al., An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing, IEEE Access, 17 (2019), 24626–24633.
  • 17. M. L. Wen, X. Zhao, M. Q. Cai, et al., End-to-end verification code recognition based on deep learning, Wireless Inter. technol., 14 (2017), 85–86.
  • 18. Y. Peng, Research on verification code recognition based on deep convolutional neural network, Commu. world, 1 (2018), 66–67.
  • 19. Z. Zhang, S. F. Wang and L. Dong, Verification code recognition based on deep learning, J. hubei univ. technol., 2 (2018), 5–11.
  • 20. S. R. Zhou, W. L. Liang, J. G. Li, et al., Improved VGG model for road traffic sign recognition, Comput. Mat. Con., 1 (2018), 11–24.
  • 21. W. Fang, F. H. Zhang and V. S. Sheng, A method for improving CNN-based image recognition using DCGAN, Comput. Mat. Con., 1 (2018), 167–178.
  • 22. Y. P. Lv, F. P. Cai, D. Z. Lin, et al., Chinese character CAPTCHA recognition based on convolution-neural network, Proceedings of the IEEE Congress on Evolutionary Computation, (2016), 4854–4859.
  • 23. G. Garg and C. Pollett, Neural network CAPTCHA crackers, Proceedings of the Future Technologies Conference, (2016), 853–861.
  • 24. Y. H. Shen, R. G. Ji and D. L. Cao, Hacking Chinese touclick CAPTCHA by multiscale corner struc-ture model with fast pattern matching, Proceedings of the ACM International Conference on Multimedia, (2014), 853–856.
  • 25. W. Fan, J. G. Han, Fan Gou, et al., Chinese character verification code recognition by convolutional neural network, Comput. Eng. Appl., 3 (2018), 160–165.
  • 26. G. Huang, Z. Liu, L. V. D Maaten, et al., Densely connected convolutional networks, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, (2017), 2261–2269.
  • 27. N. Ma, X. Zhang, H. T. Zheng, et al., ShuffleNet V2: practical guidelines for efficient CNN architecture design, Computer Vision and Pattern Recognition, preprint, arXiv:1807.11164.


This article has been cited by

  • 1. Jiaohua Qin, Jianhua Chen, Xuyu Xiang, Yun Tan, Wentao Ma, Jing Wang, A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion, Journal of Real-Time Image Processing, 2019, 10.1007/s11554-019-00909-3
  • 2. Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan, Qiang Liu, Lingyun Xiang, Coverless real-time image information hiding based on image block matching and dense convolutional network, Journal of Real-Time Image Processing, 2019, 10.1007/s11554-019-00917-3
  • 3. Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang, Coverless Image Steganography: A Survey, IEEE Access, 2019, 7, 171372, 10.1109/ACCESS.2019.2955452
  • 4. Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Junshan Tan, Yuanjing Luo, Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping, Knowledge-Based Systems, 2019, 105375, 10.1016/j.knosys.2019.105375
  • 5. Jiaohua Qin, Wenyan Pan, Xuyu Xiang, Yun Tan, Guimin Hou, A biological image classification method based on improved CNN, Ecological Informatics, 2020, 101093, 10.1016/j.ecoinf.2020.101093
  • 6. Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou, A video coverless information hiding algorithm based on semantic segmentation, EURASIP Journal on Image and Video Processing, 2020, 2020, 1, 10.1186/s13640-020-00512-8
  • 7. Yuantao Chen, Linwu Liu, Jiajun Tao, Runlong Xia, Qian Zhang, Kai Yang, Jie Xiong, Xi Chen, The improved image inpainting algorithm via encoder and similarity constraint, The Visual Computer, 2020, 10.1007/s00371-020-01932-3
  • 8. Nan Li, Qianyi Jiang, Qi Song, Rui Zhang, Xiaolin Wei, , Document Analysis Systems, 2020, Chapter 5, 60, 10.1007/978-3-030-57058-3_5
  • 9. Jiaohua Qin, Jing Wang, Yun Tan, Huajun Huang, Xuyu Xiang, Zhibin He, Coverless Image Steganography Based on Generative Adversarial Network, Mathematics, 2020, 8, 9, 1394, 10.3390/math8091394
  • 10. Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu, Coverless image steganography based on DenseNet feature mapping, EURASIP Journal on Image and Video Processing, 2020, 2020, 1, 10.1186/s13640-020-00521-7
  • 11. Dengyong Zhang, Haixin Tong, Feng Li, Lingyun Xiang, Xiangling Ding, An Ultra-Short-Term Electrical Load Forecasting Method Based on Temperature-Factor-Weight and LSTM Model, Energies, 2020, 13, 18, 4875, 10.3390/en13184875
  • 12. Lingyun Xiang, Shuanghui Yang, Yuhang Liu, Qian Li, Chengzhang Zhu, Novel Linguistic Steganography Based on Character-Level Text Generation, Mathematics, 2020, 8, 9, 1558, 10.3390/math8091558
  • 13. Jiangchun Mo, Yucai Zhou, The image inpainting algorithm used on multi-scale generative adversarial networks and neighbourhood, Automatika, 2020, 61, 4, 704, 10.1080/00051144.2020.1821535
  • 14. Achmad Abdurrazzaq, Ahmad Kadri Junoh, Zainab Yahya, Ismail Mohd, New white blood cell detection technique by using singular value decomposition concept, Multimedia Tools and Applications, 2020, 10.1007/s11042-020-09946-8

Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved