Create a Custom CAPTCHA and Contact Form in PHP
This tutorial, originally published 10 years ago, has been completely updated with modern code for generating random CAPTCHAs. Many comments in the discussion thread refer to the outdated code.
Automating processes is a key benefit of coding, leveraging computers' speed and accuracy. However, this power can be misused for malicious activities like spamming or password cracking. This tutorial focuses on anti-spam techniques.
Consider a website with a contact form. While convenient for legitimate users, it's vulnerable to automated spam submissions. Bots can flood contact forms, forums, or comment sections with spam links.
The solution? A test distinguishing bots from humans: a CAPTCHA integrated with a PHP form. Traditional CAPTCHAs present distorted text within an image; humans can read it, but bots typically cannot. This verifies user input against the original CAPTCHA text. CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart."
This tutorial demonstrates creating and integrating a CAPTCHA into a contact form.
Creating a CAPTCHA
We'll use the PHP GD library. Previous tutorials cover GD's text and shape drawing capabilities. We'll also generate a random string for the CAPTCHA.
Generating a Random String
This code resides in captcha.php
. The generate_string()
function creates the random string. The original generate_string()
function has been replaced with the more secure random_int()
.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|
Creating the CAPTCHA Background
Next, we generate the CAPTCHA image background (200x50 pixels) using five varying colors.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 |
|
Random $red
, $green
, and $blue
values determine the base color. A loop creates darker shades, stored in the $colors
array. The lightest color fills the background, and subsequent rectangles add complexity.
Example CAPTCHA Background Image
Rendering the CAPTCHA String
Finally, we draw the random string onto the background. Letter color, y-coordinate, and rotation are randomized for added difficulty.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 |
|
Downloaded fonts provide character variation. Padding (15 pixels) is added, and the remaining space is divided evenly among the characters.
Example CAPTCHA Image (Background and Text)
Integrating the CAPTCHA into the Contact Form
Now, let's integrate the CAPTCHA into the contact form (assuming you have a pre-existing contact form). We'll use sessions to store and validate the CAPTCHA text.
The complete captcha.php
code:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 |
|
Add this HTML above the "Send Message" button in your contact form:
1 2 3 4 5 |
|
Add this JavaScript to allow refreshing the CAPTCHA:
1 2 3 4 |
|
Example Contact Form with CAPTCHA
Finally, update your contact form processing script (contact.php
) to validate the CAPTCHA:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 |
|
This checks if the user's input matches the session-stored CAPTCHA text.
Conclusion
This tutorial created a custom PHP CAPTCHA and integrated it into a contact form, enhancing security and user experience with a refresh button. You can adapt this to use different CAPTCHA methods, such as math problems. For more advanced features, consider using plugins from CodeCanyon.
The above is the detailed content of Create a Custom CAPTCHA and Contact Form in PHP. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

RESTAPI design principles include resource definition, URI design, HTTP method usage, status code usage, version control, and HATEOAS. 1. Resources should be represented by nouns and maintained at a hierarchy. 2. HTTP methods should conform to their semantics, such as GET is used to obtain resources. 3. The status code should be used correctly, such as 404 means that the resource does not exist. 4. Version control can be implemented through URI or header. 5. HATEOAS boots client operations through links in response.

In PHP, exception handling is achieved through the try, catch, finally, and throw keywords. 1) The try block surrounds the code that may throw exceptions; 2) The catch block handles exceptions; 3) Finally block ensures that the code is always executed; 4) throw is used to manually throw exceptions. These mechanisms help improve the robustness and maintainability of your code.

The main function of anonymous classes in PHP is to create one-time objects. 1. Anonymous classes allow classes without names to be directly defined in the code, which is suitable for temporary requirements. 2. They can inherit classes or implement interfaces to increase flexibility. 3. Pay attention to performance and code readability when using it, and avoid repeatedly defining the same anonymous classes.

In PHP, the difference between include, require, include_once, require_once is: 1) include generates a warning and continues to execute, 2) require generates a fatal error and stops execution, 3) include_once and require_once prevent repeated inclusions. The choice of these functions depends on the importance of the file and whether it is necessary to prevent duplicate inclusion. Rational use can improve the readability and maintainability of the code.

There are four main error types in PHP: 1.Notice: the slightest, will not interrupt the program, such as accessing undefined variables; 2. Warning: serious than Notice, will not terminate the program, such as containing no files; 3. FatalError: the most serious, will terminate the program, such as calling no function; 4. ParseError: syntax error, will prevent the program from being executed, such as forgetting to add the end tag.

PHP and Python each have their own advantages, and choose according to project requirements. 1.PHP is suitable for web development, especially for rapid development and maintenance of websites. 2. Python is suitable for data science, machine learning and artificial intelligence, with concise syntax and suitable for beginners.
