


Best practices for generating verification code images with shadow effects using PHP and GD libraries
Best practices for using PHP and GD libraries to generate verification code images with shadow effects
Verification code (Captcha) is a common security measure used to determine whether the user is a real user and not a robot . A common way to generate a CAPTCHA is to create an image containing random characters and ask the user to identify and enter those characters from the image. In order to increase the security of the verification code, we can add some visual effects, such as shadow effects, to the generated verification code image. This article will introduce the best practices for using PHP and GD libraries to generate verification code images with shadow effects.
The GD library is a powerful graphics processing library that can be used through PHP extension modules. First, we need to ensure that the GD library is installed on the server. If you are using a Linux system, you can install the GD library through the following command:
sudo apt-get install php-gd
If you are using a Windows system, you can uncomment the following line in the php.ini file to enable the GD extension:
;extension=gd
After the installation is completed, we can start generating verification code images with shadow effects.
First, we need to create a PHP file and introduce the GD library at the top of the file:
<?php header('Content-Type: image/png'); $width = 200; $height = 60; $image = imagecreate($width, $height);
Next, we can define some variables commonly used to generate verification code images, such as character set, Verification code length, etc.:
$charset = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"; $codeLength = 4; $font = "path/to/font.ttf"; $fontSize = 30;
In the above code, we use a character set containing uppercase letters, lowercase letters and numbers, and the verification code length is 4 characters. You can customize the character set and verification code length as needed. At the same time, a custom font file (.ttf format) and font size are set.
Next, we can generate the captcha string and background color and add them to the image:
$code = ""; for ($i = 0; $i < $codeLength; $i++) { $char = $charset[rand(0, strlen($charset) - 1)]; $code .= $char; $color = imagecolorallocate($image, rand(0, 60), rand(0, 60), rand(0, 60)); imagettftext($image, $fontSize, rand(-10, 10), 10 + $i * ($fontSize + 10), $height / 2 + $fontSize / 2, $color, $font, $char); }
In the above code, we generate a random captcha string through a loop , and use the imagecolorallocate()
function to create a random background color. Then, use the imagettftext()
function to add the captcha characters to the image. By adjusting the parameters of the imagettftext()
function, we can change the position, angle and color of the verification code characters.
Now, we can add a shadow effect to the verification code image. First, we need to create an image with the same size as the shadow layer:
$shadowImage = imagecreate($width, $height);
Next, we can draw the shadow layer on top of the original image. We can create a shadow effect by using the imagecopy()
function to copy the original image to the shadow layer and offset the original image before copying:
$offsetX = 2; $offsetY = 2; imagecopy($shadowImage, $image, $offsetX, $offsetY, 0, 0, $width, $height);
In the above code, We copy the original image to the shadow image, and make a position offset to the original image when copying, that is, moving 2 pixels to the lower right in the x and y directions.
Finally, we merge the original image and shadow layer, and output the final verification code image:
imagecopymerge($image, $shadowImage, 0, 0, 0, 0, $width, $height, 50); imagepng($image); imagedestroy($image); imagedestroy($shadowImage);
In the above code, we use the imagecopymerge()
function to The shadow layer is merged into the original image, using 50% transparency when merging. Then, use the imagepng()
function to output the final verification code image. Finally, we call the imagedestroy()
function to release the memory and destroy the original image and shadow layer.
The complete verification code generation code is as follows:
<?php header('Content-Type: image/png'); $width = 200; $height = 60; $image = imagecreate($width, $height); $charset = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"; $codeLength = 4; $font = "path/to/font.ttf"; $fontSize = 30; $code = ""; for ($i = 0; $i < $codeLength; $i++) { $char = $charset[rand(0, strlen($charset) - 1)]; $code .= $char; $color = imagecolorallocate($image, rand(0, 60), rand(0, 60), rand(0, 60)); imagettftext($image, $fontSize, rand(-10, 10), 10 + $i * ($fontSize + 10), $height / 2 + $fontSize / 2, $color, $font, $char); } $shadowImage = imagecreate($width, $height); $offsetX = 2; $offsetY = 2; imagecopy($shadowImage, $image, $offsetX, $offsetY, 0, 0, $width, $height); imagecopymerge($image, $shadowImage, 0, 0, 0, 0, $width, $height, 50); imagepng($image); imagedestroy($image); imagedestroy($shadowImage); ?>
With the above code, we can generate a verification code picture with a shadow effect. You can save the above code as a PHP file, and then import and output the file where the verification code image needs to be generated. When the user accesses the PHP file, the verification code image will be output directly.
To summarize, using PHP and the GD library to generate a verification code image with a shadow effect requires the following steps:
- Install the GD library.
- Create a PHP file and introduce the GD library.
- Define variables commonly used to generate verification code images, including character set, verification code length, font file and font size.
- Creates an image with the specified width and height.
- Generate a random captcha string and add it to the image.
- Create a shadow layer image of the same size, copy the original image to the shadow layer, and offset the position.
- Merge original image and shadow layer to add shadow effect.
- Output the final verification code image and destroy the memory.
I hope this article can help you understand how to use PHP and GD libraries to generate verification code images with shadow effects, and provide higher security for your verification code function.
The above is the detailed content of Best practices for generating verification code images with shadow effects using PHP and GD libraries. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
