Computer and Modernization ›› 2019, Vol. 0 ›› Issue (03): 28-.doi: 10.3969/j.issn.1006-2475.2019.03.006
Previous Articles Next Articles
Received:
2018-09-11
Online:
2019-04-08
Published:
2019-04-10
CLC Number:
ZHAN Wei, ZHANG Ke, XU Huan, LUO Xian, LONG Fei, JI Yi-yi. A Mobile Face Recognition Technology Based on Diffusion Speed[J]. Computer and Modernization, 2019, 0(03): 28-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2019.03.006
[1] ROSS A A, NANDAKUMAR K, JAIN A K. Handbook of Multibiometrics[M]. Springer, US, 2006. [2] JAIN A K, ROSS A, PANKANTI S. Biometrics: A Tool for Information Security[M]. IEEE Press, 2006. [3] OGORMAN L. Comparing passwords, tokens, and biometrics for user authentication[J]. Proceedings of the IEEE, 2003,91(12):2021-2040. [4] LAWTON G. Biometrics: A new era in security[J]. Computer, 2002,31(8):16-18. [5] ROSS A, JAIN A. Information fusion in biometrics[J]. Pattern Recognition Letters, 2003,24(13):2115-2125. [6] SCHUCKERS S A C. Spoofing and anti-spoofing measures[J]. Information Security Technical Report, 2002,7(4):56-62. [7] JAIN A K, PANKANTI S, PRABHAKAR S, et al. Biometrics: A grand challenge[J]. International Conference on Pattern Recognition, 2004,2(4):935-942. [8] GRAGNANIELLO D, POGGI G, SANSONE C, et al. Local contrast phase descriptor for fingerprint liveness detection[J]. Pattern Recognition, 2015,48(4):1050-1058. [9] FAUNDEZ-ZANUY M. Biometric security technology[J]. IEEE Aerospace & Electronic Systems Magazine, 2006,21(6):15-26. [10]CHIRILLO J, BLAUL S. Implementing Biometric Security[M]. Indianapolis Wiley, 2003. [11]KWAN P W, WELCH M C, FOLEY J J. A knowledge-based decision support system for adaptive fingerprint identification that uses relevance feedback[J]. Knowledge-Based Systems, 2015,73:236-253. [12]ALI M M H, MAHALE V H, YANNAWAR P, et al. Fingerprint recognition for person identification and verification based on minutiae matching[C]// 2016 IEEE 6th International Conference on Advanced Computing. 2016:332-339. [13]DING C, TAO D. Robust face recognition via multimodal deep face representation[J]. IEEE Transactions on Multimedia, 2015,17(11):2049-2058. [14]HU G, YANG Y, YI D, et al. When face recognition meets with deep learning: An evaluation of convolutional neural networks for face recognition[C]// Proceedings of IEEE International Conference on Computer Vision Workshops. 2015:142-150. [15]MADANE M, THEPADE S. Score level fusion based bimodal biometric identification using Thepade’s sorted n-ary block truncation coding with variod proportions of iris and palmprint traits[J]. Procedia Computer Science, 2016,79:466-473. [16]DAUGMAN J. New methods in iris recognition[J]. IEEE Transactions on Systems Man Cybernetics-System, 2007,37(5):1167-1175. [17]THALHEIM L, KRISSLER J, ZIEGLER P M. Body Check[J/OL]. Translated by SMITH R W.(2002-02-11). http://www.heise.de/ct/english/02/11/114. [18]ALTER F, DURAND S, FROMENT J. Adapted total variation for artifact free decompression of JPEG images[J]. Journal of Mathematical Imaging & Vision, 2005,23(2):199-211. [19]TAKASHI M, KEIICHI T, TAKAO K. Imposture using synthetic speech against speaker verification based on spectrum and pitch[C]// Proceedings of International Conference on Semiconductor Laser and Photonics. 2000:302-305. [20]LEON P L D, APSINGEKAR V R, PUCHER M, et al. Revisiting the security of speaker verification systems against imposture using synthetic speech[C]// IEEE International Conference on Acoustics Speech and Signal Processing. 2010:1798-1801. [21]MEYER H. Six biometric devices point the finger at security[J]. Computers and Security, 1998,17(5):410-411. [22]JIN Q, TOTH A R, BLACK A W, et al. Is voice transformation a threat to speaker identification?[C]// IEEE International Conference on Acoustics, Speech and Signal Processing. 2008:4845-4848. [23]CHINGOVSKA I, ANJOS A, MARCEL S. On the effectiveness of local binary patterns in face anti-spoofing[C]// IEEE International Conference of the Biometrics Special Interest Group(BIOSIG). 2012:1-7. |
[1] | WANG Yanyuan, MAO Zhengchong. Detection and Recognition Algorithms for Chinese and English Scene Text Images [J]. Computer and Modernization, 2024, 0(12): 84-90. |
[2] | DONG Yuwen. Multi-scale Moving Object Detection Algorithm Based on Improved YOLOv7-tiny [J]. Computer and Modernization, 2024, 0(11): 99-105. |
[3] | QI Xian, LIU Daming, CHANG Jiaxin. Multi-view 3D Reconstruction Based on Improved Self-attention Mechanism [J]. Computer and Modernization, 2024, 0(11): 106-112. |
[4] | CHEN Kai1, LI Yiting1, 2, QUAN Huafeng1. A River Discarded Bottles Detection Method Based on Improved YOLOv8 [J]. Computer and Modernization, 2024, 0(11): 113-120. |
[5] | YANG Qingwu, LUO Xiaohui, LIU Xin. Industrial Image Circle Detection Algorithm Based on Edge Drawing [J]. Computer and Modernization, 2024, 0(11): 121-126. |
[6] | ZHOU Anda, TANG Chaoying. Semantic Segmentation Algorithm for Rainy Road Scene and Its Mobile Deployment [J]. Computer and Modernization, 2024, 0(10): 7-13. |
[7] | YANG Jun1, HU Wei1, ZHU Wenfu2. Visual SLAM Loop Closure Detection Algorithm Based on Improved MobileNetV3 [J]. Computer and Modernization, 2024, 0(10): 21-26. |
[8] | WEI Xuecheng1, JIANG Lingyun1, LI Yan2, HE Fei2. Improved Roadside Monocular View Small Target Detection Algorithm Based on YOLOv5 [J]. Computer and Modernization, 2024, 0(10): 27-34. |
[9] | ZHANG Ze1, ZHANG Jianquan2, 3, ZHOU Guopeng2, 3. Camera Module Defect Detection Based on Improved YOLOv8s [J]. Computer and Modernization, 2024, 0(09): 107-113. |
[10] | CHENG Yazi1, LEI Liang1, 2, CHEN Han1, ZHAO Yiran1. Multi-scale Depth Fusion Monocular Depth Estimation Based on Transposed Attention [J]. Computer and Modernization, 2024, 0(09): 121-126. |
[11] | WANG Mengxi, LI Jun. Review of Fall Detection Technologies for Elderly [J]. Computer and Modernization, 2024, 0(08): 30-36. |
[12] | MA Yong, WANG Jun, ZHANG Zijian, ZHAO Yuyang, ZHANG Jing, ZHOU Ming. Improved YOLOv8 Behavior Detection Algorithm for Intelligent Operation and#br# Maintenance System [J]. Computer and Modernization, 2024, 0(08): 43-48. |
[13] | ZHENG Shangpo1, CHEN Defu1, LI Jianli2, LIN Guoxian2, WANG Xingping3. Pedestrian Tracking Algorithm Based on Improved YOLOv5s and DeepSORT [J]. Computer and Modernization, 2024, 0(08): 54-58. |
[14] | WANG Xin, YU Lei. Multi-scale Dual Attention Image Super-resolution Reconstruction Method [J]. Computer and Modernization, 2024, 0(08): 77-87. |
[15] | XU Xin’ai, LI Gang. An Image Generation Method of Classroom Expression Images [J]. Computer and Modernization, 2024, 0(08): 88-91. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||