Face recognition

Face recognition

ID:38701102

大小:113.99 KB

页数:7页

时间:2019-06-17

Face recognition_第1页
Face recognition_第2页
Face recognition_第3页
Face recognition_第4页
Face recognition_第5页
资源描述:

《Face recognition》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、,QIRUPLQJ6FLHQFH6SHFLDO,VVXHRQ0XOWLPHGLD,QIRUPLQJ7HFKQRORJLHV²3DUW9ROXPH1RAnIntroductiontoFaceRecognitionTechnologyShang-HungLin,Ph.D.ICMediaCorporationshanghung.lin@ic-media.comAbstractRecentlyfacerecognitionisattractingmuchattentioninthesocietyofnetworkmultimediainformationacces

2、s.Areassuchasnetworksecurity,con-tentindexingandretrieval,andvideocompressionbenefitsfromfacerecognitiontechnologybecause"people"arethecenterofattentioninalotofvideo.Networkaccesscontrolviafacerecognitionnotonlymakeshackersvirtuallyimpossibletostealone's"password",butalsoincreasestheuser-

3、friendlinessinhuman-computerinteraction.Indexingand/orretrievingvideodatabasedontheappearancesofparticularpersonswillbeuse-fulforuserssuchasnewsreporters,politicalscientists,andmoviegoers.Fortheapplicationsofvideophoneandteleconferencing,theassistanceoffacerecognitionalsoprovidesamoreeffi

4、cientcodingscheme.Inthispaper,wegiveanintroductorycourseofthisnewinformationprocessingtechnology.Thepapershowsthereadersthegenericframeworkforthefacerecognitionsystem,andthevariantsthatarefrequentlyencounteredbythefacerecognizer.Severalfamousfacerecognitionalgorithms,suchaseigenfacesandne

5、uralnetworks,willalsobeexplained.Keywords:FaceRecognition;BiometricIdentification;NetworkSecurityandSurveillance;NeuralNetwork;Karhonen-Loeve(KL)Transform;ImageProcessingautomatedmethodsofverifyingorrecognizingtheidentityofIntroductionalivingpersononthebasisofsomephysiologicalcharacteris-

6、tics,suchasfingerprintsorfacialfeatures,orsomeaspectsofIntoday'snetworkedworld,theneedtomaintainthesecuritytheperson'sbehavior,likehis/herhandwritingstyleorkey-ofinformationorphysicalpropertyisbecomingbothincreas-strokepatterns.Sincebiometricsystemsidentifyapersonbyinglyimportantandincrea

7、singlydifficult.Fromtimetotimebiologicalcharacteristics,theyaredifficulttoforge.wehearaboutthecrimesofcreditcardfraud,computerbreak-in'sbyhackers,orsecuritybreachesinacompanyorgovern-AmongthevariousbiometricIDmethods,thephysiologicalmentbuilding.Intheyear1998,sophis

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。