Design of an Authentication System Based on Face Recognition and the Second Generation ID Detection

Article Preview

Abstract:

Combined with the knowledge of BP neural network and template matching, a new face recognition method was given. It matched the face image which was identified with the serial number and corresponding to the face model that based on random sequence in the matching process. The acquisition image should be preprocessed in filtering, smoothing and sharpening way by using BP neural network learning ability and classification ability which can achieve classifier. By using the actual face, it verify the correctness and reliability of the hardware and software design, manifest a good authentication capabilities and provide a reference for the research of similar products.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 542-543)

Pages:

968-971

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Meng. Research on eyes location method based on support vector machines[D]. Lanzhou: Lanzhou Jiaotong university, (2011)

Google Scholar

[2] Hong Lin, Jain Anil.Integrating Faces and Fingerprints for Personal Identification[J].IEEE Transcations on Pattern Analysis and Machine Intelligence, 1998, 20(12):1295-1307

DOI: 10.1109/34.735803

Google Scholar

[3] C.P. Zhang, G.D. Su. Face recognition technology overview[J]. Journal of Image and Graphics, (2005)

Google Scholar

[4] Turk M A, Pentland A P.Eigenfaces for recognition [J].Journal of Cognitive Neuroscience, 1991, 3(l): 71-86

Google Scholar

[5] Yu H,Yang J. A direct LDA algorithm for highdimen- sional data with application to face recognition [J].Pattern Recognition, 2001, 34, 2067-2070

DOI: 10.1016/s0031-3203(00)00162-x

Google Scholar

[6] Lades M, Vorbruggen J C, Buhmann J, et al.Distortion invariant object recognition in the dynamic Link architecture[J].IEEE Transactions on Computer, 1993, 42(3):300-311

DOI: 10.1109/12.210173

Google Scholar

[7] Rabiner L R.A tutorial on hidden Markov models and seleeted applications in speech recognition [J].Proceedings of the IEEE, 1989, 77(2):257-256

DOI: 10.1109/5.18626

Google Scholar

[8] H.L. Zhong. Design and implementation of identity authentication system based on face recognition and RFID[D]. Suzhou: Soochow university, (2010)

Google Scholar

[9] J.Y. Gan, Y.W. Zhang. Face Recognition Based on BP Neural Network[J]. Systems Engineering and Electronics, 2003,25(1):113-115

Google Scholar