Previous Articles Next Articles
Received:
2018-09-11
Online:
2019-04-08
Published:
2019-04-10
CLC Number:
ZHAN Wei, ZHANG Ke, XU Huan, LUO Xian, LONG Fei, JI Yi-yi. A Mobile Face Recognition Technology Based on Diffusion Speed[J]. Computer and Modernization, doi: 10.3969/j.issn.1006-2475.2019.03.006.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2019.03.006
[1] ROSS A A, NANDAKUMAR K, JAIN A K. Handbook of Multibiometrics[M]. Springer, US, 2006. [2] JAIN A K, ROSS A, PANKANTI S. Biometrics: A Tool for Information Security[M]. IEEE Press, 2006. [3] OGORMAN L. Comparing passwords, tokens, and biometrics for user authentication[J]. Proceedings of the IEEE, 2003,91(12):2021-2040. [4] LAWTON G. Biometrics: A new era in security[J]. Computer, 2002,31(8):16-18. [5] ROSS A, JAIN A. Information fusion in biometrics[J]. Pattern Recognition Letters, 2003,24(13):2115-2125. [6] SCHUCKERS S A C. Spoofing and anti-spoofing measures[J]. Information Security Technical Report, 2002,7(4):56-62. [7] JAIN A K, PANKANTI S, PRABHAKAR S, et al. Biometrics: A grand challenge[J]. International Conference on Pattern Recognition, 2004,2(4):935-942. [8] GRAGNANIELLO D, POGGI G, SANSONE C, et al. Local contrast phase descriptor for fingerprint liveness detection[J]. Pattern Recognition, 2015,48(4):1050-1058. [9] FAUNDEZ-ZANUY M. Biometric security technology[J]. IEEE Aerospace & Electronic Systems Magazine, 2006,21(6):15-26. [10]CHIRILLO J, BLAUL S. Implementing Biometric Security[M]. Indianapolis Wiley, 2003. [11]KWAN P W, WELCH M C, FOLEY J J. A knowledge-based decision support system for adaptive fingerprint identification that uses relevance feedback[J]. Knowledge-Based Systems, 2015,73:236-253. [12]ALI M M H, MAHALE V H, YANNAWAR P, et al. Fingerprint recognition for person identification and verification based on minutiae matching[C]// 2016 IEEE 6th International Conference on Advanced Computing. 2016:332-339. [13]DING C, TAO D. Robust face recognition via multimodal deep face representation[J]. IEEE Transactions on Multimedia, 2015,17(11):2049-2058. [14]HU G, YANG Y, YI D, et al. When face recognition meets with deep learning: An evaluation of convolutional neural networks for face recognition[C]// Proceedings of IEEE International Conference on Computer Vision Workshops. 2015:142-150. [15]MADANE M, THEPADE S. Score level fusion based bimodal biometric identification using Thepade’s sorted n-ary block truncation coding with variod proportions of iris and palmprint traits[J]. Procedia Computer Science, 2016,79:466-473. [16]DAUGMAN J. New methods in iris recognition[J]. IEEE Transactions on Systems Man Cybernetics-System, 2007,37(5):1167-1175. [17]THALHEIM L, KRISSLER J, ZIEGLER P M. Body Check[J/OL]. Translated by SMITH R W.(2002-02-11). http://www.heise.de/ct/english/02/11/114. [18]ALTER F, DURAND S, FROMENT J. Adapted total variation for artifact free decompression of JPEG images[J]. Journal of Mathematical Imaging & Vision, 2005,23(2):199-211. [19]TAKASHI M, KEIICHI T, TAKAO K. Imposture using synthetic speech against speaker verification based on spectrum and pitch[C]// Proceedings of International Conference on Semiconductor Laser and Photonics. 2000:302-305. [20]LEON P L D, APSINGEKAR V R, PUCHER M, et al. Revisiting the security of speaker verification systems against imposture using synthetic speech[C]// IEEE International Conference on Acoustics Speech and Signal Processing. 2010:1798-1801. [21]MEYER H. Six biometric devices point the finger at security[J]. Computers and Security, 1998,17(5):410-411. [22]JIN Q, TOTH A R, BLACK A W, et al. Is voice transformation a threat to speaker identification?[C]// IEEE International Conference on Acoustics, Speech and Signal Processing. 2008:4845-4848. [23]CHINGOVSKA I, ANJOS A, MARCEL S. On the effectiveness of local binary patterns in face anti-spoofing[C]// IEEE International Conference of the Biometrics Special Interest Group(BIOSIG). 2012:1-7. |
[1] | FU Hong-lin, ZHANG Tai-hong, YANG Ya-ting, Aizimaiti Aiwanier, MA Bo. Scenes Text Modification Network for Uyghur Based on Generative Adversarial Network [J]. Computer and Modernization, 2024, 0(01): 41-46. |
[2] | LI Ying-ying, HUANG Wen-pei. View Frustum Culling Algorithm for Scene Based on Optimized Octree [J]. Computer and Modernization, 2024, 0(01): 103-108. |
[3] | MA Ze-yu, YE Ning, XU Kang, WANG Su, WANG Ru-chuan, . Behavior Recognition Method Based on FMCW Radar and ResNeSt-GRU [J]. Computer and Modernization, 2023, 0(11): 101-107. |
[4] | ZHANG Jia-Qi, XU Qi-lei. Apple Defect Detection Algorithm Based on NAM-YOLO Network [J]. Computer and Modernization, 2023, 0(10): 53-58. |
[5] | LI Yan-man, WANG Bi-heng, ZHAO Ling-yan. Safety Helmet Detection Based on Lightweight YOLOv5 [J]. Computer and Modernization, 2023, 0(10): 59-64. |
[6] | ZHANG Nan, LI Wen-jing, LIU Cai, XIE Ke, MA Shi-qian, XIAO Jun-hao, ZOU Feng. Real-time Behavioral Safety Warning for Power Operators Based on Multi-source Data [J]. Computer and Modernization, 2023, 0(10): 84-91. |
[7] | CHEN Zi-jian, DUAN Chun-hong. Automatic Epistemic Emotion Recognition Based on Facial Expression in E-learning [J]. Computer and Modernization, 2023, 0(10): 92-98. |
[8] | NONG Hao-cheng, REN De-jun, REN Qiu-lin, LIU Peng-li, HUANG De-cheng. Surface Anomaly Detection Algorithm of Flexible Plastic Packaging Based on Improved ConvNeXt [J]. Computer and Modernization, 2023, 0(08): 12-17. |
[9] | LIU Yu-shan, LIU Wei-kang, LIU Qing-hua, ZHE Tian-tian, WANG Jia-cheng. Pedestrian Detection Algorithm for Ship-borne Vehicles Based on YOLOX Combined#br# with DeepSort [J]. Computer and Modernization, 2023, 0(08): 60-67. |
[10] | SHAN Yu, ZHANG Hao-peng, CHI Jing. Lightweight License Plate Detection Algorithm Based on Improved YOLOv4 [J]. Computer and Modernization, 2023, 0(07): 99-104. |
[11] | LUO Wei, LIU Si-yuan, XU Jian-xiang, DONG Tian-pei. Improved Solar Cell Defect Detection Algorithm Based on YOLOv5s [J]. Computer and Modernization, 2023, 0(07): 119-126. |
[12] | XU Hao, TIAN Zhen-yu, LI Chao-fan, CUI Xin-xin, YANG Jian-lan. An Early Diagnosis Method of COVID-19 Infection Based on ResNeXt and Improved nnU-Net [J]. Computer and Modernization, 2023, 0(06): 21-26. |
[13] | LI Shi-qiu. A Collaborative Representation-based Method of Discriminant Locality Preserving Projections [J]. Computer and Modernization, 2023, 0(06): 43-47. |
[14] | PENG Ming-kang, FENG Cheng-de. An Improved Algorithm of Removing Adherent Noise Based on Binocular Vision [J]. Computer and Modernization, 2023, 0(06): 62-68. |
[15] | ZHOU Fang-yu, CHEN Shu-rong. A Feature-enhanced Tri-CNN Pedestrian Re-identification Method [J]. Computer and Modernization, 2020, 0(09): 60-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||