Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Confrontation learning-based method and system for generating image confrontation verification codes

A learning method and captcha technology, applied in the field of image adversarial captcha generation based on confrontational learning, can solve the problem of failing to deceive cracker classifiers, failing to meet the needs of anti-captcha defense, and failing to understand the captcha cracker model in advance Parameters and other issues to achieve the effect of improving security, enhancing security, and adapting

Active Publication Date: 2018-10-30
ZHEJIANG UNIV
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the verification code attack and defense environment, we, as the defender, cannot know the model parameters used by the verification code cracker in advance; even the cracker will use image preprocessing methods to process the image before recognizing the image to remove noise
In this way, adding noise to the image cannot achieve the effect of deceiving the cracker's classifier, and the existing noise generation method based on adversarial learning cannot meet the needs of anti-captcha defense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confrontation learning-based method and system for generating image confrontation verification codes
  • Confrontation learning-based method and system for generating image confrontation verification codes
  • Confrontation learning-based method and system for generating image confrontation verification codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be noted that the following embodiments are intended to facilitate the understanding of the present invention, but do not limit it in any way.

[0051] Such as figure 1 As shown, the image adversarial verification code generation system based on adversarial learning includes three modules: attack module, generation module and evaluation module. The attack module is used to provide image recognition models and attack methods to the generation module and evaluation module; the function of the generation module is to generate image confrontation verification codes according to user requests; the function of the evaluation module is to use the attack means provided by the attack module to simulate the confrontation generated by the production module Verification code, and finally evaluate the security against verification code by simulating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a confrontation learning-based method for generating image confrontation verification codes. The method comprises the following steps of: (1) selecting an image recognizing neural network A and an attack algorithm a; (2) generating an image confrontation verification code on the basis of a confrontation learning method according to the trained image recognizing model A andthe attack algorithm; (3) selecting one or more image recognizing models B, selecting one or more attack algorithms b, cracking the image confrontation verification code generated in the step (2) according to the image recognition model B and the attack algorithm b and adjusting a generation strategy of the image confrontation verification code according to the cracking result; and (4) generatingan image confrontation verification code according to the adjusted generation strategy of the image confrontation verification code. The invention also discloses a system for generating the image confrontation verification codes. The method disclosed by the invention has the beneficial effects that a small amount of special noise is added to an image verification code through confrontation learning to attack a depth image recognizing model and the security of the image verification code is protected in the manner of weakening the attack ability of a verification code cracker.

Description

technical field [0001] The invention relates to the fields of machine learning model security and image verification code security, in particular to an image confrontation verification code generation method and system based on confrontational learning. Background technique [0002] Captcha is a Turing test that is easy for humans to solve but hard for current programs to solve. It is widely deployed on Web pages, and can effectively prevent some malicious behaviors, such as batch registration of zombie accounts, hacking, etc. [0003] There are many types of verification codes, and one of the commonly used verification codes is a verification code based on image recognition, referred to as an image verification code. Image captchas require users to correctly select all images in a set of images that match a certain semantic meaning. Compared with other types of verification codes, image verification codes have a better balance between security and usability: images contai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06K9/34G06K9/36
CPCG06V10/20G06V10/267G06F18/21
Inventor 纪守领施程辉徐晓刚陈建海
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products