search
HomeJavajavaTutorialHow to implement image verification code in Java API development

With the rapid development of Internet technology, in order to ensure system security, verification codes have become an essential part of each system. Among them, picture verification code is favored by developers due to its ease of use and security. This article will introduce the specific method of implementing image verification code in Java API development.

1. What is picture verification code

Picture verification code is a way of human-machine verification through pictures. It usually consists of a random combination of pictures containing numbers, letters, symbols, etc., which improves the security of the system. Its working principle includes: the user enters the verification code on the login page, and the background verifies the entered verification code. Only users who have passed the verification can proceed to the next step.

2. Use the image generation tool class in Java development

Java provides the BufferedImage class to generate images during development. In actual development, we usually use string utility classes, such as RandomStringUtils, to generate random strings, and then draw the strings through the BufferedImage class and Graphics class.

The specific implementation steps are as follows:

1. Generate a random string

String randomStr = RandomStringUtils.randomAlphanumeric(4);

Among them, randomAlphanumeric() Method generates a string of random uppercase and lowercase letters and numbers.

2. Draw pictures

BufferedImage image = new BufferedImage(WIDTH, HEIGHT, BufferedImage.TYPE_INT_RGB);
Graphics g = image.getGraphics();

/ / Draw background
g.setColor(new Color(240, 240, 240));
g.fillRect(0, 0, WIDTH, HEIGHT);

// Draw characters
g.setColor(new Color(50, 50, 50));
g.setFont(new Font("Georgia", Font.BOLD, 20));//Set the font
g.drawString(randomStr, 10, 20);

3. Set the image verification method

HttpSession session = request.getSession();

// Store the random string in the session, and Set the validity time
session.setAttribute("img_random", randomStr);
session.setMaxInactiveInterval(60 * 2);//Set the session expiration time to 2 minutes

//Set the verification code plus Salt
String sessionId = session.getId();
String codeWithSessionId = randomStr sessionId;
String salt = DigestUtils.md5Hex(codeWithSessionId);

// Will salt the verification code Store in the session
session.setAttribute("img_salt", salt);

Improve the security of the verification code by confusing the random string with the sessionID.

4. Output image

response.setContentType("image/jpeg");//Specify the content type of the returned image
ServletOutputStream outputStream = response.getOutputStream();
ImageIO .write(image, "JPEG", outputStream);
outputStream.close();

Finally, output the image to the client through ServletOutputStream.

3. Verification of image verification code in Java development

After the user enters the verification code, the background code needs to verify the verification code entered by the user. The specific implementation steps are as follows:

1. Get the user input verification code

String inputCode = request.getParameter("code");

2. Get the verification code stored in the session Verification code and salted verification code

String randomCode = (String) session.getAttribute("img_random");
String saltCode = (String) session.getAttribute("img_salt");

3. Verify the verification code entered by the user after adding salt

String sessionId = session.getId();
String codeWithSessionId = inputCode + sessionId;
String salt = DigestUtils.md5Hex(codeWithSessionId);
if (salt.equalsIgnoreCase(saltCode)) {
    // 验证码正确
} else {
    // 验证码不正确
}

By obtaining the verification code entered by the user and the verification code stored in the session, use the same salting method for verification. to ensure the correctness of the verification code.

Conclusion:

Through the steps introduced in this article, we can easily implement the image verification code function in Java development. Using verification codes can effectively increase the security of the system and prevent malicious attacks. If there is no verification code in your system, you can also try the above method.

The above is the detailed content of How to implement image verification code in Java API development. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
JVM performance vs other languagesJVM performance vs other languagesMay 14, 2025 am 12:16 AM

JVM'sperformanceiscompetitivewithotherruntimes,offeringabalanceofspeed,safety,andproductivity.1)JVMusesJITcompilationfordynamicoptimizations.2)C offersnativeperformancebutlacksJVM'ssafetyfeatures.3)Pythonisslowerbuteasiertouse.4)JavaScript'sJITisles

Java Platform Independence: Examples of useJava Platform Independence: Examples of useMay 14, 2025 am 12:14 AM

JavaachievesplatformindependencethroughtheJavaVirtualMachine(JVM),allowingcodetorunonanyplatformwithaJVM.1)Codeiscompiledintobytecode,notmachine-specificcode.2)BytecodeisinterpretedbytheJVM,enablingcross-platformexecution.3)Developersshouldtestacross

JVM Architecture: A Deep Dive into the Java Virtual MachineJVM Architecture: A Deep Dive into the Java Virtual MachineMay 14, 2025 am 12:12 AM

TheJVMisanabstractcomputingmachinecrucialforrunningJavaprogramsduetoitsplatform-independentarchitecture.Itincludes:1)ClassLoaderforloadingclasses,2)RuntimeDataAreafordatastorage,3)ExecutionEnginewithInterpreter,JITCompiler,andGarbageCollectorforbytec

JVM: Is JVM related to the OS?JVM: Is JVM related to the OS?May 14, 2025 am 12:11 AM

JVMhasacloserelationshipwiththeOSasittranslatesJavabytecodeintomachine-specificinstructions,managesmemory,andhandlesgarbagecollection.ThisrelationshipallowsJavatorunonvariousOSenvironments,butitalsopresentschallengeslikedifferentJVMbehaviorsandOS-spe

Java: Write Once, Run Anywhere (WORA) - A Deep Dive into Platform IndependenceJava: Write Once, Run Anywhere (WORA) - A Deep Dive into Platform IndependenceMay 14, 2025 am 12:05 AM

Java implementation "write once, run everywhere" is compiled into bytecode and run on a Java virtual machine (JVM). 1) Write Java code and compile it into bytecode. 2) Bytecode runs on any platform with JVM installed. 3) Use Java native interface (JNI) to handle platform-specific functions. Despite challenges such as JVM consistency and the use of platform-specific libraries, WORA greatly improves development efficiency and deployment flexibility.

Java Platform Independence: Compatibility with different OSJava Platform Independence: Compatibility with different OSMay 13, 2025 am 12:11 AM

JavaachievesplatformindependencethroughtheJavaVirtualMachine(JVM),allowingcodetorunondifferentoperatingsystemswithoutmodification.TheJVMcompilesJavacodeintoplatform-independentbytecode,whichittheninterpretsandexecutesonthespecificOS,abstractingawayOS

What features make java still powerfulWhat features make java still powerfulMay 13, 2025 am 12:05 AM

Javaispowerfulduetoitsplatformindependence,object-orientednature,richstandardlibrary,performancecapabilities,andstrongsecurityfeatures.1)PlatformindependenceallowsapplicationstorunonanydevicesupportingJava.2)Object-orientedprogrammingpromotesmodulara

Top Java Features: A Comprehensive Guide for DevelopersTop Java Features: A Comprehensive Guide for DevelopersMay 13, 2025 am 12:04 AM

The top Java functions include: 1) object-oriented programming, supporting polymorphism, improving code flexibility and maintainability; 2) exception handling mechanism, improving code robustness through try-catch-finally blocks; 3) garbage collection, simplifying memory management; 4) generics, enhancing type safety; 5) ambda expressions and functional programming to make the code more concise and expressive; 6) rich standard libraries, providing optimized data structures and algorithms.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software