{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:46:56Z","timestamp":1777704416944,"version":"3.51.4"},"reference-count":17,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T00:00:00Z","timestamp":1532044800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>When using the current authentication code recognition system to identify the character authentication code, there are the problems of low integrity and low recognition accuracy. In this regard, a design method of artificial intelligence recognition system for cracking character type authentication code is proposed in this paper. The denoising algorithm based on the connected domain is used to remove the noise in the character type authentication code, and the character authentication code after the denoising is normalized. The feature extraction module is used to extract color moments, color correlation diagrams and LBP texture features of character authentication codes, and complete the feature extraction of character authentication codes. The similarity matching module is used to match the characters of the character authentication code. In the recognition module, the character authentication code is classified by the classification algorithm based on multi-feature SVM, and the recognition of the character authentication code is completed. The experimental results show that the proposed method has high information integrity and high recognition accuracy.<\/jats:p>","DOI":"10.3233\/jifs-169760","type":"journal-article","created":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T16:42:15Z","timestamp":1532450535000},"page":"4411-4420","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial intelligence recognition system for cracking character authentication code"],"prefix":"10.1177","volume":"35","author":[{"given":"Yuan","family":"Sun","sequence":"first","affiliation":[{"name":"School of Mathematics and Information Engineering, Puyang Vocational and Technical College, Puyang, China"}]}],"member":"179","published-online":{"date-parts":[[2018,7,20]]},"reference":[{"issue":"4","key":"e_1_3_1_2_2","first-page":"518","article-title":"Zero-shot Object recognition system based on topic model","volume":"45","author":"Hoo W.L.","year":"2017","unstructured":"HooW.L. and ChanC.S. , Zero-shot Object recognition system based on topic model, IEEE Transactions on Human-Machine Systems45(4) (2017), 518\u2013525.","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2549518"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.09.015"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2504388"},{"issue":"18","key":"e_1_3_1_6_2","first-page":"1","article-title":"Research on captcha recognition with convolutional neural networks","volume":"52","author":"Shao W.Y.","year":"2016","unstructured":"ShaoW.Y. , GuoY.F. and LiuH. , Research on captcha recognition with convolutional neural networks, Computer Engineering and Applications52(18) (2016), 1\u20137.","journal-title":"Computer Engineering and Applications"},{"issue":"2","key":"e_1_3_1_7_2","first-page":"201","article-title":"Shearer\u2019s coal-rock recognition system based on fuzzy neural network information fusion","volume":"27","author":"Zhang Q.","year":"2016","unstructured":"ZhangQ. , WangH.J. , JingW.et al., Shearer\u2019s coal-rock recognition system based on fuzzy neural network information fusion, China Mechanical Engineering27(2) (2016), 201\u2013208.","journal-title":"China Mechanical Engineering"},{"issue":"2","key":"e_1_3_1_8_2","first-page":"450","article-title":"Speech enhancement recognition system based on CS","volume":"33","author":"Mao Z.C.","year":"2016","unstructured":"MaoZ.C. and GongX. , Speech enhancement recognition system based on CS, Application Research of Computers33(2) (2016), 450\u2013453.","journal-title":"Application Research of Computers"},{"issue":"1","key":"e_1_3_1_9_2","first-page":"177","article-title":"Recognition of vehicle brand and model based on discrete particle swarm optimization","volume":"33","author":"Zhang H.B.","year":"2016","unstructured":"ZhangH.B. , LiH.L. , MaS.L.et al., Recognition of vehicle brand and model based on discrete particle swarm optimization, Computer Simulation33(1) (2016), 177\u2013180.","journal-title":"Computer Simulation"},{"issue":"13","key":"e_1_3_1_10_2","first-page":"1960","article-title":"Speech corpus development for a speaker independent spontaneous urdu speech recognition system","volume":"33","author":"Henke F.S.","year":"2016","unstructured":"HenkeF.S. , MannF.M. , WildK.et al., Speech corpus development for a speaker independent spontaneous urdu speech recognition system, Journal of Plant Nutrition33(13) (2016), 1960\u20131969.","journal-title":"Journal of Plant Nutrition"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjbs.2016.09.001"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1080\/15567249.2017.1410593"},{"issue":"1","key":"e_1_3_1_13_2","first-page":"100","article-title":"In-silico study of potential carboxylic acid derivatives as D-glutamate ligase inhibitors in Salmonella typhi","volume":"45","author":"Qadir M.I.","year":"2018","unstructured":"QadirM.I. , MushtaqH. and MobeenT. , In-silico study of potential carboxylic acid derivatives as D-glutamate ligase inhibitors in Salmonella typhi, Kuwait Journal of Science45(1) (2018), 100\u2013107.","journal-title":"Kuwait Journal of Science"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720502.2016.1259761"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2016.1178933"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2018039"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2016.1.00020"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2016.1.00022"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169760","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169760","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:09Z","timestamp":1777455669000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,20]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-169760"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169760","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,20]]}}}