生物识别技术及其嵌入式应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
二十一世纪的一个显著特征就是身份信息的数字化和隐性化,在这个网络化、信息化的时代,如何准确鉴定一个人的身份,保护信息安全已经成为必须解决的一个关键社会问题。传统的身份鉴别技术已经不能完全满足现代社会经济活动与发展的需要,采用人体自身所固有的生物特征来鉴别身份被认为是本世纪最安全的身份鉴别手段,若将它们与传统身份认证技术相结合,势必大大提高身份鉴别的安全性和准确性。
     本文对人脸、掌纹、指纹和虹膜等几种生物识别的基本原理和主要方法进行了综述,重点研究了人脸和掌纹识别的基本理论和相关技术。在基于彩色图像的人脸检测中,提出了在考虑光照影响的情况下,将色度空间与Hough变换相结合的快速人脸检测定位算法。对基于Haar-like特征与AdaBoost学习算法的人脸检测方法进行了探讨,对级联分类器的构建给出了分析和评价,指出了级联分类器构建过程中参数的选择方法。
     在掌纹识别方面,提出了一种新的基于关键点加权的掌纹识别方法,并在此基础上设计了一个同时利用手的几何特征和掌纹的纹理特征进行掌纹识别的多模态掌纹识别系统。该系统将掌纹识别的过程分为粗匹配和精细匹配两个阶段。在粗匹配阶段对掌纹图像进行预处理,得到手指的几何特征和掌纹的感兴趣区域(ROI),然后利用手指的几何特征进行粗匹配,以筛选出一个较小的候选特征模板集合。在精细匹配阶段,首先利用多通道二维Gabor滤波器对掌纹的ROI区域进行滤波,再对滤波后的图像进行关键点加权,以提取掌纹的局部纹理特征。最后将关键点之间的相对距离作为特征向量,用Mahalanobis距离进行特征匹配,实验验证了多模态掌纹识别系统的识别率以及关键点加权方法的有效性。
     最后,根据嵌入式应用系统工程化设计的思想,给出了基于嵌入式人像识别门禁、人像考勤机和网络摄像机等应用系统的硬件设计架构和关键环节,分析并总结了嵌入式应用系统设计过程中的一些关键问题及其解决方法。
One of remarkable characteristics in twenty-one century is that the personal identification information becomes digital and recessive. It has been a pivotal problem in the computer network and informatics age on how to identity a person exactly and ensure the safety of information. Those traditional approaches of personal identification such as certificates, intellective cards, pass words and keys could not meet the modern society development because of their hidden trouble safety such as loss, forgery, counterfeit and embezzlement etc. The biometrics identification technology can provide a solution. It combines the computer technology with biometric technology, which uses human inherent biological characteristics such as palm-print, face and iris, and behavioral characteristics such as gait, signature and speech to judge a person’s identity in order to replace or strengthen those traditional personal identification approaches.
     This paper gives a summery dissertation of basic principle and primary method on several biometric identification technologies such as finger-print, iris, palm-print and face. The evaluate standard is also discussed for a biometric identification system. The basic theory and correlative technology are primarily studied about face and palm-print identification. Finally, this paper gives the implement and its important technology in some embedded application system on face recognition.
     The finger-print recognition is the earliest technology to be studied and used. It can identify a person by the global features and local features on his finger. The global features are those features which can be observed directly including finger-print shape, pattern area, core point, delta point and ridge count. They describe the global finger-print structure. On the other hand, the local features are those features of points including ending points, bifurcation points, ridge divergence points, dots or islands, enclosure points and short ridges. There are several algorithms for finger-print identification. For instance, the point-mode match algorithm, texture mode match algorithm, mixed feature match algorithm, finger image match algorithm etc. The finger-print identification technology is relatively successful, and its veracity is only lower than iris identification. At the same time, the finger-print identification needs person’s cooperation. It is osculated and attacked.
     The veracity of iris identification is the highest among all biometric identification technologies these days. It is one of the most developing biometric identification technologies. However, it is in limit application area for these reasons such as the costly capturing device, complicated capturing method, feature extraction, feature expression, matching etc. We should do more research on iris image capture under natural eye’s open, taking the masking area of eyelid and process of eyelashes disturbance.
     It is accepted that the face is the most prevalent and convenient biometric feature used for personal identification. It is non-osculated and non-attacked personal identification method. The cost of face image capturing is very cheap as it can be captured by common lens. Generally, we also judge someone by his or her face. Therefore, face recognition is the most direct and acceptable biometric identification technology.
     This paper proposes a new algorithm during face detection for color image on condition at the effect of light. It is a fast algorithm which combines the color space with Hough transform for the detection and location of face. The face image will be repaired for light firstly after being captured. And then establishes the ellipse model in YC_bCr_p space based on the skin-color on face. The operation of inflate and erode is completed before the initialized face detection. The region of face can be located rapidly and accurately after the center of pupil is detected by the automatically adapted illegibility Hough transform. The algorithm is validated on the Georgia Tech Face Database.
     The algorithm for face detection, based on Haar-like feature and Adaboost learning, is also discussed in the paper. Analyses and evaluates the construction of multi-classification. A method is proposed for the selection of parameters during the multi-classification designing. Finally, an embedded application based on AdaBoost and PCA is implemented so as to estimate the performance of the algorithm under the embedded environment.
     This paper presents a novel approach for personal identification using weighting relative distance of key point scheme on hand images. At the same time, a new multimodal palm-print identification system is given, in which, both hand geometrical features and region of interest (ROI) features are employed and a coarse-to-fine dynamic identification strategy is adopted to implement a reliable and real time personal identification system. The process of palm-print identification is divided into two level stages including coarse level matching and fine level matching. The hand image is preprocessed during coarse level stage. As a result, five hand geometrical features and the ROI are extracted after the coarse level stage. The size of ROI will be transformed into 128*128 pixels before fine level stage. Then, the five hand geometrical features are used to guide the selection of a small set of similar candidate samples at the coarse level matching stage. In the fine level matching stage, we use mutlti-channel 2-D Gabor filters to process the ROI and get some filtered image. And then extract the key points to analyze the local feature structure of palm-print texture information. The key points are computed from sub-images, in size of 32*32 pixels, which are from filtered palm-print image division. The weighting key point approach is used to set value for key point based on the difference of channel. At decision stage, the Mahalanobis distance matching mechanism is employed to match the test sample among the candidate set samples and output the identification result.
     In the system-design phase we performed several verification tests to find the optimum values for the system parameters. First of all, we use non-WKP approach to test the difference judgment among those channels of multi-channel 2-D filter. And then select those channels whose judgment performance is better. A bigger value is set for the better channel, and a smaller value is set for the worse channel.
     We compare our approach with non-WKP, WKP, multimodal system based on WKP under the same amount of samples. The experiment result shows that the accurate rate of WKP is better than that of non-WKP. The identification performance of multimodal system is best among the three approaches and its accuracy is 96.41 percent. However, the high accuracy is based on longer time of identification because of its coarse-to-fine processing. We aim to find a new validate approach on palm-print identification in this paper. The research on speed of algorithm and accuracy will be explored for the future.
     Several embedded application system architectures, based on biometric identification, are discussed in chapter five of this paper. We propose the thought and approach for every embedded application system. At last, we give the process to design a few embedded application system such as the embedded face recognition door manager, embedded face recognition attendance system and network-vidicon.
     We provide a architect for the single-door and double-access face recognition system. The principle of hardware is proposed for the door manager terminal. The DSP, which is the center of hardware system, is described in detail on how to joint with other components and image capturing module. The work flow of door manager system is also provided in this paper. At the same time, we explain the flow chart for the software algorithm and evaluate the performance of the door manager system. The solutions for real time, safety and explanation are all put forward.
     We give the principle and method of designing the embedded attendance system based on face recognition door manager. In this section, we give the architect of embedded attendance system and the detailed circuit diagram for those important components such as image sensor and network interface. The work flow of attendance, on how to work with face recognition, is also given in this paper. We give the running parameters of the attendance in the end.
     A DSP-based network-vidicon design method is given at the end of this paper. In this section, we also design its architecture and the diagram of those important components such as DSP-based board, image capturing module and network interface etc. We illuminate something advanced in our network-vidicon by comparison with those existed products. Finally, some greatly important questions are discussed in the paper.
引文
[1]苑玮琦,柯丽,白云.生物特征识别技术[M].北京:科学出版社.2009.
    [2]陆颖.指纹自动识别原理与方法综述[J].工程数学学报, 2004, 21(6): 1003-1010.
    [3] International Biometric Group, Biometrics Market and Industry Report 2009-2014[EB/OL]. (2008-09-04) [2008.10.15]. http://www.biometricgroup.com/ reports/public/market_report.php.
    [4] Duta N, Jain A K, Mardia K. Matching of palmprint [J]. Pattern Recognition Letters, 2001, 23(4):477-485.
    [5] Shu W, Zhang D. Automated personal identification by palmprint [J]. Optical Engineering, 1998, 37(8):2359-2362.
    [6] Kumar A, Wong D, Shen H, et al. Personal Verification Using Palmprint and Hand Geometry Biometric[C]. Lecture Notes in Computer Science, 2003, 2688:668-678.
    [7] Connie T, Teoh A, Goh M, et al. Palmprint Recognition with PCA and ICA [C]. Proc. of the Image and Vision Computing New Zealand.2003:227-232.
    [8] Han C, Chen H, Lin C, et al. Personal authentication using palm-print features [J]. Pattern Recognition, 2003, 36(2):371-381.
    [9]田捷,杨鑫.生物特征识别理论与应用[M].北京:清华大学出版社.2009.
    [10]束为,荣钢,边肇祺等.基于方向投影的自动掌纹基准点检测[J].清华大学学报(自然科学版),1999,39(1):98-100.
    [11]束为,荣钢,边肇祺等.利用掌纹进行身份自动鉴别方法的研究[J].清华大学学报(自然科学版),1999, 39(1):95-97.
    [12] Li W, Zhang D, Xu Z. Palmprint identification based on fourier transform [J]. Journal of Software, 2002, 13(5):879-886.
    [13] Ge H W, Liang Y C, Marchese M. A modified particle swarm optimization- based dynamic recurrent neural network for identifying and controlling nonlinear systems[J], Computers & Structures, 2007, 85(21-22): 1611- 1622.
    [14] R. Brunelli and D. Falavigna. Person identification using multiple cues [J]. IEEE Transactions on PAMI, 1995, 17(10):915-966.
    [15] L. Hong and A. K. Jain. Integrating faces and fingerprints for personal identification [J]. IEEE Transactions on PAMI, 1998, 20(12):1295~1307.
    [16] L. C. Ferri, A. Mayerhofer, M. Frank, C. Vielhauer and R. Steinmetz. Biometric authentication for ID cards with hologram watermarks [J]. Security and Watermarking of Multimedia Contents IV, 2002, 4675: 629–640.
    [17] Arun Ross, Rohin Govindarajan. Feature Level Fusion Using Hand and Face Biometrics [C]. Proc. of SPIE Conference on Biometric Technology for Human Identification II, 2005, 5779:196-204.
    [18] Lorene Allano, Andrew C. Morris, Harin Sellahewa, etc. Nonintrusive multibiometrics on a mobile device: a comparison of fusion techniques[C]. SPIE 2006, Conference on Biometric Technology for Human Identification III, April 2006, 6202:62020P.
    [19] Andrew C. Morris, Sabah Jassim, Harin Sellahewa, Lorene Allano. Multimodal person authentication on a smartphone under realistic conditions[C]. SPIE 2006, Symposium on Defense and Security, 2006:6250-6260.
    [20] Koreman, J.Morris, A.C. Wu, D. Jassim, S.Sellahewa. Non-intrusive multi-modal biometric authentication on the SecurePhone PDA[C]. Proc. MMUA workshop on Multi-Modal User Authentication, Toulouse, France, May 2006, 6250-06.
    [21] Sellahewa, H., Al-Jawad, N., Morris, A., Wu, D., Koreman, J. and Sabah A Jassim. Comparison of weighting strategies in early and late fusion approaches to audio-visual person authentication[C]. SPIE 2006 Symposium on Defense and Security, 2006, 6250: 62500C.
    [22] Yunhong Wang, Tieniu Tan, and Anil K. Jain. Combining Face and Iris Biometrics for Identity Verification[C], Proc. of AVBPA'2003, 2003
    [23]陈羽,赖剑煌.基于多分类器融合的人脸识别方法[J].中山大学学报(自然科学版), 2006, 45(4): 24-27.
    [24]古红英,潘云鹤.基于纹理特征融合约减的虹膜识别研究[J].计算机研究与发展, 2006,43(1):126-131.
    [25]周立功. ARM嵌入式系统基础教程[M].北京:北京航空航天大学出版社. 2006
    [26]张铎.生物识别技术基础[M].武汉:武汉大学出版社. 2009
    [27]陆颖.指纹自动识别原理与方法综述[J].工程数学学报, 2004, 21(6): 1003- 1010.
    [28] X P Luo, J Tian, and Y Wu. Aminutia matching algorithm in fingerprint verification[C].15th ICPR, Barcelona, 2000, 4:833-836.
    [29] S Ranade, A Rosenfeld. Point Pattern Matching by Relaxation [J]. Pattern Recognition, 1986, 19:113-122.
    [30] G Stockman, S Kopstein, S Benett. Matching Images to Models for Registration and Object Detection via Clustering [J]. IEEE Trans. On Pattern Analysis and Machina Intelligence, 1982, 4(3):229-241.
    [31]时鹏,田捷,苏琪,杨鑫.基于奇异点邻近结构的快速指纹识别[J].软件学报, 2008, 19(12):3134-3146.
    [32] A K Jain, H Lin, S Prabhakar, et al. On-line Identity Authentication System Using Fingerprints[C]. Proc. of the IEEE, 1997, 85:1365-1388.
    [33]罗希平,田捷.自动指纹识别中的图像增强与细节匹配[J].软件学报, 2002, 13(5):946-956.
    [34] Y L He, J Tian, X P Luo, et al. Image Enhancement and Minutia Matching in Fingerprint Verification [J]. Pattern Recognition, 2003, 24(9):1349-1360.
    [35] A Jain, A Ross, S Prabhakar. Fingerprint Matching Using Minutiae and Texture Features[C]. Proc. of International Conference on Image Processing (ICIP), 2001:282-285.
    [36]苑玮琦,李宏伟.基于指纹结构特征信息匹配的算法[J].光电工程, 2006, 33(7): 101-104, 109.
    [37]朱凌云,陈少春.基于纹理特征的指纹识别算法[J].自动化与仪器仪表, 2009, 2:11-14.
    [38]贾聪智,解梅,李庆嵘.基于矢量三角法的指纹特征匹配算法的研究[J].计算机应用, 2004, 24(7): 45-46, 49.
    [39] Jain A K, Hong L, Kulkarni Y. A Mutimodal Biometric System Using Fingerprints, Face and Speech[C]. 2nd International Conference on Audio- and Video-based Biometric Person Authentication, 1999, 182-187.
    [40]张堂辉.指纹匹配算法的研究与应用[D]. 2003.
    [41] J Zhou, J W Gu. A Mode-based Method for The Computation of Fingerprints Orientation Field [J]. IEEE Trans. On Image Processing, 2004, 13(6):821-835.
    [42] D Isenor, S Zaky.Fingerprint Identification Using Graph Matching [J]. Pattern Recognition, 1986, 19:113-122.
    [43] M K Sparrow, P J Sparrow. A Topological Approach to the Matching of Single Fingerprints[S]: Development of Algorithms for Use on Rolled Impressions. National Bureau of Standards Special Publication 500-126, U.S. Government Printing Office, Washington, D.C, 1985.
    [44] A K Hrechak, J A Mchugh.Automated Fingerprint Recognition Using Structural Matching [J]. Pattern Recognition, 1990, 23(8):893-904.
    [45] J Daugman. High Confidence Visual Recognition of Persons by A Test of Statistical Independence [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1993, 15(11):1148-1161.
    [46] J Daugman. Statistical Richness of Visual Phase Information: Update onRecognizing Persons by Iris Patterns [J]. International Journal of Computer Vision, 2001, 45(1):25-38.
    [47] Daugman J. Wavelet Demodulation Codes, Statistical Independence, Pattern Recognition[C]. Institute of Mathematics and Its Applications, Proc. of 2nd IMA-IP London: Albion, 1999:244-260.
    [48] L Ma, Y Wang, T Tan. Iris Recognition Using Circular Symmetic Spatial Frequency Filters[C]. Proc. of 16th International Conference on Pattern Recognition, 2002, (2):414-417.
    [49] Shinyoung Lim, Kwanyong Lee, Okhwan Byeon, et al. Efficient Iris Recognition through Improvement Feature Vector and Classiflier [J]. ETRI Journal, 2001, 23(2):61-70.
    [50] W W Boles, B Boashash. A Human Identification Technique Using Images of The Iris and Wavelet Transform [J]. IEEE Trans. On Signal Processing, 1998, 46:1185-1188.
    [51] R P Wildes, et al. A Machine-vision System for Iris Recognition [J]. Machine Vision and Applications, 1996, 9:1-8.
    [52] L Ma, Y Wang, T Tan. Iris Recognition Based on Multichannel Gabor Filtering[C]. Proc.of 5th Asian Conference on Computer Vision, 2002, I: 279- 283.
    [53] L Ma, Y Wang, T Tan. Iris Recognition Using Circular Symmetric Filters [C]. The 6th International Conference on Pattern Recognition, 2002, II:414-417.
    [54] J Z Huang, L Ma, Y H Wang, et al. Iris Model Based on Local Orientation Description[C]. In Proc. of Asian Conference on Computer Vision, Korea, 2004:954-959.
    [55] Jiali Cui, Li Ma, Yunhong Wang, et al. An Appearance-based Method for Iris Detection[C]. The 6th Asian Conference on Computer Vision, Jeju Korea, 2004, 2:1091-1096.
    [56] Zhenan Sun, Tieniu Tan, Yunhong Wang. Robust Encoding of Local Ordinal Measures:A General Framework of Iris Recognition[C], ECCV Workshop on Biometric Authentication 2004, Berlin, London, 2004: 270-282.
    [57] The Yale Face Database B [DB/OL]. (2001-05-31). [2001.08.14]. http://cvc.yale.edu /projects/yalefacesB/yalefacesB.html
    [58] Georghiades, A.S. and Belhumeur, P.N. and Kriegman, D.J. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose [J]. IEEE Trans. Pattern Anal. Mach. Intelligence, 2000, 23(6):643-660
    [59] Lv X G, Zhou J, Zhang C S. A Novel Algorithm for Rotated Human Face Detection [J]. Proc. of IEEE Conference on Computer Vision and Pattern Recognition, Hilton Head Island, South Carolina, USA, 2000:760-764.
    [60] Ai H Z, Liang L H, Xu G Y. A General Framework for Face Detection[C]. 3rd Conference on Multimodal Interfaces, Lecture Notes in Computer Science, 2000, 1948:119-126.
    [61] Miao J, Yin B C, Wang K Q, et al. A Hietrachical Multiscale and Multiangle System for Human Face Detection in A Complex Background Using Gravity-center Template [J]. Pattern Recognition, 1999, 32(10):1237-1248.
    [62]刑昕,汪孔桥,沈兰荪.基于器官跟踪的人脸实时跟踪方法[J].电子学报, 2000, 28(6): 29-31
    [63]刘明宝,姚鸿勋,高文.彩色图像的实时人脸跟踪方法[J].计算机学报, 1998, 21(6): 527-532.
    [64] Wang J G, Tan T N. A New Face Detection Method Based on Shape Information [J]. Pattern Recognition Letters, 2000, 21(6-7):463-471.
    [65]梁路宏,艾海舟,徐光佑等.人脸检测研究综述[J].计算机学报, 2002, 25(5):449-458.
    [66]薛斌党.嵌入式隐Markov模型和神经网络人脸识别[D].大连理工大学博士论文, 2003.
    [67] M.H. Yang, D.J. Kriegman, N.Ahuja. Detecting Faces in Images A Survey [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(1): 34-58.
    [68] Lee C H, Kim J S, Park K H. Automatic Human Face Location in A Complex Background Using Motion and Color Information [J]. Pattern Recognition, 1996, 29(11):1877-1899.
    [69] Dal Y, Nakano Y. Face-texture Model Based on SGLD and Its Application in Face Detection in A Color Scene[J]. Pattern Recognition, 1996, 29(6): 1007- 1017.
    [70] Saber E, Tekalp A M. Frontal-view Face Detection and Facial Feature Extraction Using Color, Shape and Symmetry Based Cost Functions [J]. Pattern Recognition Letters, 1998, 19(8): 669-680.
    [71] Zabrodsky H, Peleg S, Avnir D. Symmetry as a Continuous Feature [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995, 17(12): 1154 -1166.
    [72] Marques F, Vilaplana V. Face Segmentation and Tracking Based on ConnectedOperators and Partition Projection [J]. Pattern Recognition, 2002, 35(3):601-604.
    [73] Yullie A, Hallinan P, Coben D. Feature Exaction from Faces Using Deformable Templates [J]. International Journal of Computering Vision, 1992, 8(2):99-111.
    [74] Jain A-K, Zhong Y, Dubuission-Jolly M-P. Deformable Template Models: A Review [J]. Signal Processing, 1998, 71(2):109-129.
    [75] Moghaddam B, Pentland A. Probabilistic Visual Learning for Object Representation[J]. IEEE Trans. Pattern Analysis and Machine Intelligence, 1997, 19(7):696-710.
    [76] Zhu Y, Schwartz S, Orchard M. Fast Face Detection Using Subspace Discriminant Wavelet Features[C]. Proc. of IEEE Conference on Computer Vision and Pattern Recognition, Hilton Head Island, South Carolina, Usa, 2000:636-642.
    [77] Meng L, Nguyen T Q, Castanon D A. An Image-based Bayesian Framework for Face Detection[C]. Proc. of IEEE Conference on Computer Vision and Pattern Recognition, Hilton Head Island, South Carolina, USA, 2000:302-307.
    [78] Rowley H A. Neural Network-based Face Detection [D]. CMU-CS-99-117, 1999.
    [79] Rowley H A, Baluja S, Kanade T. Neural Network-based Face Detection [J]. IEEE Trans. On Pattern Analysis and Machine Intelligence, 1998, 20(1):23-38.
    [80] H Rowley, S Baluja, T Kanade. Retation Invariant Neural network-based Face Detection[C]. Proc. of IEEE Conference on Computer Vision and Pattern Recognition, 1998:38-44.
    [81] P Juel, Land R Marsh. A Hierarchical Neural Network for Human Face Detection [J]. Pattern Recongition, 1996, 29(5):781-787.
    [82] Kouzani A Z, He F, Sammut K. Commonsense Knowledge-based Face Detection[C]. Proc. of Conference on Intellegent Engineering Systems, Budapast, Hungary, 1997:215-220.
    [83] Anifantis D, Dermatas E, Kokkinakis G. A Neural Network Method for Accurate Face Detection on Arbitray Images[C]. Proc. of Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 1:109-112.
    [84] Schneiderman H, Kanade T. Probabilistic Modeling of Local Appearance and Spatial Relationships for Object Recongition[C]. Proc. of IEEE Conference on Computer Vision and Pattern Recognition, Santa Barbara, California, 1998: 45-51.
    [85] Schneiderman H. A Statistical Approach to 3D Object Detection Applied to Faces and Cars [D]. CMU-RI-TR-00-06, 2000.
    [86] Nefian A V, Hayes M H. Face Detection and Recognition Using Hidden Markov Models[C]. Proc. of Conference on Automatic Face and Gesture Recognition, Grenoble, Fance, 2000.
    [87] Nefian A V, Hayes M H. An Embedded HMM-based Approach for Face Detection and Recognition[C]. Proc. of IEEE Conference on Acoustics, Speech, and Signal Processing, Phoenix, Arizona 1999, 6:3553-3556.
    [88] B E Boser, I M Guyon, V N Vapnik. A Training Algorithm for Optimal Margin Classifier[C]. Proc. of 5th ACM Workshop on Computational Learning Theory, Pittsburgh, 1992:144-152.
    [89] S R Gunn. Support Vector Machines for Classification and Regression[R].Image Speech and Intelligent Systems Research group, University of Southampton, 1997.
    [90] Osuna E, Freund R, Girosi F, Training Support Vector Machines: An Application to Face Detection[C]. Proc. of Computer Vision and Pattern Recognition, Puerto Rico, 1997: 130-136.
    [91] Yuille A L. Deformable Templates for Face Recognition [J]. Cognitive Neurosc ience, 1991, 3(1):59-70.
    [92] Nikolaidis A, Pitas I. Facial Feature Extraction and Pose Determination [J]. Pattern Recognition, 2000, 33(11):1783-1791.
    [93]张翠平,苏光大.人脸识别技术综述.中国图像图形学报, 2000, 5(11):885-894.
    [94] K Eremad, R Chellappa. Discriminant Analysis for Recognition of Human Face Images [J]. J. of Optical Society of American, 1997, 8(14):1724-1733.
    [95] M Lades, J C Vorbruggen, J Buhmann,et al. Distortion Invariant Object Recognition in the Dynamic Link Architecture[J]. IEEE Trans. On Computers, 1993, 42(3):300-311.
    [96] P S Pencv, J Atick. Local Feature Analysis:A General Statistical Theory for Object Representation[J]. Network: Computation in Neural System, 1996, 7(3): 477-500.
    [97] S Choi, O Lee. Factorial Code Representation of Faces for Recognition[C]. Proc. of 1st IEEE International Workshop on Biologically Inspired Vision, 2000:42-51.
    [98] Y Wang, T Tan, Y Zhu. Face Verification Based on Singular Value Decomposition and Radial Basis Function Neural Network[C]. Proc. of 4thAsian Conference on Computer Vision, 2000, 1:432-435.
    [99] Y Tian, T Tan, Y Wang, et al. Does Singular Value Contain Adequate Information for Face Recognition? [J]. Pattern Recognition, 2003, 36(3):649-655.
    [100] G Gacia, G Zikos, G Tziritas. Wavelet Packet Analysis for Face Recognition [J]. Image and Vision Computering, 2000, 18(4):289-297.
    [101] O Vel, S Aeberhard. Face Recognition under Varying Pose [J]. IEEE Trans. On Pattern Analysis and Machine Intelligence, 1999, 21(10):1081-1088.
    [102] S Y Lee, Y K Ham, R H Park. Recognition of Human Front Faces Using Knowledge-based Feature Extraction and Neuro-Fuzzy Algorithm [J]. Pattern Recognition, 1996, 29(11): 1863-1876.
    [103] Y Dai, Y Nakano. Recognition of Facial Images with Low Resolution Using A Hopfield Memory Model [J]. Pattern Recognition, 1998, 32(2):159-167.
    [104] P J Philips. Support Vector Machine Applied to Face Recognition[R].Technical Report NISTIR 6241, 1999.
    [105] K Jonsson, J Kittler, Y P Li, et al. Support Vector Machines for Face Authentication[C]. Proc. of British Machine Vision Conference, T. Pridmore and D. Elliman, Ed., 1999:543-553.
    [106] Gutta S, Wechsler H. Face Recognition Using Hybrid Classifier Systems[C]. Proc. of the International Conference on Neural Networks, 1996:1017-1022.
    [107] F Samaria, S Young. Hmm-based Architecture for Face Identification [J]. Image and Vision Computing, 2000, 18(4):315-321.
    [108] C Beumier, M Acheroy. Automatic 3D Face Authentication [J]. Image and Vision Computing, 2000, 33(7):1161-1177.
    [109] P W Hallinan, G G Gordon, A L Yuille, et al. Two-and Three-dimensional Patterns of Face[M]. AK Peters Press, Natick Massachusetts,1999.
    [110]刘翼光.动态人脸识别系统[D].中国科学院计算技术研究所博士论文,2000.
    [111] Shu W, Zhang D. Automated personal identification by palmprint [J]. Optical Engineering. 1998, 37(8):2359-2362.
    [112] Shu W, Zhang D. Palmprint verification: an implementation of biometric technology [C]. IEEE International Conference on Pattern Recognition. 1998, 1: 219-221.
    [113]束为,荣钢,边肇棋,张大鹏.利用掌纹进行身份自动鉴别方法的研究[J].清华大学学报(自然科学版), 1999, 39(1):95-97.
    [114]束为,荣钢,边肇棋,张大鹏.基于方向投影的自动掌纹基准点检测[J].清华大学学报(自然科学版), 1999, 39(1):98-100.
    [115]赵明,束为,荣钢,边肇棋.基于K-L变换的掌纹自动识别[J].清华大学学报(自然科学版), 2000, 40(9):100-103.
    [116]戴青云,于英林,张大鹏.一种基于形态中值金字塔的线特征提取方法[J].华南理工大学学报, 2001, 29(6):14-18.
    [117]戴青云,于英林,张大鹏.基于结构特征的在线掌纹的分类方法[J].模式识别与人工智能, 2002, 15(1):112-116.
    [118]徐宁,王宽全,张大鹏.基于模板学习的掌纹识别[J].计算机应用研究, 2003, 7:64-66.
    [119]苏晓生,林喜荣,丁天怀等.基于小波变换的掌纹特征提取[J].清华大学学报(自然科学版), 2003, 43(8):1049-1051.
    [120]王洋,陈占伟. Ontology及掌纹识别ontology的构建[J].商丘师范学院学报, 2003, 19(5):70-72.
    [121]李文新,夏胜雄,张大鹏,许卓群.基于主线特征的双向匹配的掌纹识别新方法[J].计算机研究与发展, 2004, 41(6):996-1002.
    [122]邬向前,王宽全,张大鹏.一种用于掌纹识别的线特征表示和匹配方法[J].软件学报, 2004, 15(6):869-880.
    [123]宋烱,林喜荣,包桂秋,申晶.一种掌纹线特征的提取方法[J].计算机工程与应用, 2004, 12(40):32-34.
    [124] Jain A K, Ross A, Prabhakar S. An introduction to biometric recognition [J]. IEEE Transactions on Circuit and System for Video Technology.2004, 14(1): 4-20.
    [125] SPEX Forensics. PrintQuest APIS Automated Palmprint Identification System [EB/OL]. http://www.printquest-apis.com/,2004-01-01/2006-07-15.
    [126] Yasmin Teknologi Sdn.Bhd. Desktop Morpho Afis [EB/OL]. http://www.yasmin.com.my/products/default.html,2003-01-01/2006-07-15.
    [127] Cogent Systems Inc. Cogent Automated Palmprint and Fingerprint Identification System (CAPFIS TM) Solutions [EB/OL].
    [128]戚爽.基于关键点加权掌纹识别方法研究[D].东北师范大学硕士学位论文,2008.
    [129] Li W, Zhang D, Xu Z. Palmprint identification by Fourier transform [J]. International Journal of Pattern Recognition and Artificial Intelligence, 2002, 16(4): 417-432.
    [130] Lu G, Zhang D, Wang K. Palmprint Recognition Using Eigenpalms Features [J]. Pattern Recognition Letters, 2003, 24:1473-1477.
    [131] Zhang L, Zhang D. Characterization of Palmprints by Wavelet Signatures via Directional Context Modeling [J]. IEEE Transactions on systems, Man, and Cybernetics-Part B: Cybernetics, 2004,34(3):1335-1347.
    [132] Funada J, Ohta N, Mizoguchi M, et al. Feature extraction method for palmprint considering elimination of creases [C]. Proc. of the International Conference on Pattern Recognition. USA: IEEE, 1998:1849-1854.
    [133] Zhang D, Shu W. Two novel characteristics in palmprint verification: datum point invariance and line feature matching [J]. Pattern Recognition.1999, 32:691-702.
    [134]黎明,严超华,刘高航.基于掌纹图像分析的身份识别系统[J].中国图像图形学报, 2000,5(2):134-137.
    [135] Shu W, Rong G, Bian Z. Automatic palmprint verification [J]. International Journal of Image and Graphics, 2001, 1(1):135-151.
    [136]张泽,束为,荣钢.基于乳突纹方向特性的掌纹自动分类方法[J].清华大学学报(自然科学版),2002,42(9):1222-1224.
    [137] You J, Li W, Zhang D. Hierarchical palmprint identification via multiple feature extraction [J]. Pattern Recognition, 2002, 35(4):847-859.
    [138] Duta N, Jain A K, Mardia K. Matching of palmprints [J]. Pattern Recognition Letters, 2001, 23(4):477-485.
    [139] Li W, Zhang D, Xu Z. A Texture-based approach to palmprint retrieval for personal identification [C]. Proc. of SPIE. CA: Society of Photo-Optical Instrumentation Engineers, 2000:415-420.
    [140] Kong W, Zhang D, Li W. Palmprint feature extraction using 2-D Gabor flters [J]. Pattern Recognition.2003, 36:2339-2347.
    [141] Kong W, Zhang D. Palmprint texture analysis based on low-resolution images for personal authentication [C]. Proc. of the 16th IEEE International Conference on Pattern Recognition. USA: IEEE, 2002:807-810.
    [142] Kong W, Zhang D. Feature-level fusion for effective palmprint authentication [C]. Proc. of the International Conference on Biometric Authentication, Lecture Notes in Computer Science. Germany: Springer, 2004:761-767.
    [143] Kong A, Zhang D. Kamel M, Palmprint identification using feature-level fusion [J]. Pattern Recognition.2006,39(3):478-487.
    [144]蒲东兵,塔娜,马志强,杨立明,周春光.一种基于监控系统的人脸检测定位算法[J].东北师大学报(自然科学版),2009,41(1):40-43.
    [145]陈锻生,刘政凯.肤色检测技术综述[J].计算机学报,2006,2(29):194-207.
    [146] Terrillon J C, Shirazi M N, Fukamachi H, et al. Comparative performance of different skin chrominance models and chrominancespaces for the automatic detection of human faces in color images[C]. Proc. of 4th IEEE International Conference on Automatic Face and Gesture Recognition.2000:420-422.
    [147]唐亮,谢维信,黄建军等.自适应模糊Hough变换[J].电子学报, 2004, 6(32): 946-949.
    [148] Makram Nabti*, Ahmed Bouridane. An effective and fast iris recognition system based on a combined multiscale feature extraction technique[J]. Pattern Recognition, 2008, 41(3):868-879.
    [149] Viola P, Jones M. Rapid object detection using a boosted cascade of simple features[C].Proc. of IEEE Conference on ComPuter Vision and Pattem Recongition,Kauai,Hwaaii,USA,2001.
    [150] H.A. Rowley, S. Baluja, T. Kanade. Neural Network-Based Face Detection[J]. IEEE Transcations on Pattern Analysis and Machine Intelligence, 1998, 20(1) : 23-38.
    [151] Lienhart R.,MaydtJ. An extended set of Haar-like features for rapid object detection[C]. Proc. of IEEE Intenational Conference on Image Precessing,NewYork, USA, 2002, (l): 900-903.
    [152]Yoav Freund, Robert E. Schapire. A Decision-theoretic Generalization of On-line Learning and An Application to Boosting[C]. Second European Conference on Computational Learning Theory,1995,3.
    [153] Turk M, Pentland. A. Eigenfaces for Recognition[J].Journal of Cognitive Neuroscience,1991,3(1):71-86.
    [154] Zhang D, Kong W, You J, et al. Online palmprint identification[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(9): 1041- 1050.
    [155]荣海泓.基于掌纹图像的特征提取方法[D].哈尔滨工程大学,2004.
    [156] Li W, Zhang D, Xu Z. Image alignment based on invariant features for palmprint identification [J]. Signal Processing: Image Communication, 2003, 18: 373-379.
    [157] Lin C. L., Chuang T. C., Fan K. C..Palmprint Verification Using Hierarchical Decomposition[J]. Pattern Recognition, 2005, 38: 2639-2652.
    [158] Wu X Q, Wang K Q, Zhang D. An approach to line feature representation and matching for palmprint recognition[J]. Journal of Software, 2004, 15(6): 869- 880.
    [159] Wu P S, Li M. Pyramid adaptive dynamic hough transform to detect edges with arbitray shapes[J]. Optical Engineering, 1997,36(5):1425-1430.
    [160] Wu P S, Li M. pyramid edge detection based on stack filters[J]. Pattern Recognition Letters, 1997,18:239-248.
    [161] Wu X Q, Wang K Q, David Z. Palmprint recognition using Fisher’s linear discriminate[J]. Machine Learning and Cybernetics, 2003, 5:3150-3154.
    [162] Wu X Q, Wang K Q, David Z. HMMs Based Palmprint Identification[C]. Springer-verlag Berlin Heidelberg, 2004,775-781.
    [163] Su X, Lin X, Ding T, et al. Palmprint feature extraction based on wavelet transform [J]. Journal of Tsinghua University (Science&Technology), 2003, 43(8):1049-1051.
    [164] Dongbing Pu, Shuang Qi, Chunguang Zhou, Yinghua lu, Personal Identification Based on Weighting Key Point Scheme for Hand Image[C]. IWCIA 2008,LNCS 4958,2008:396-407.
    [165] Yu L, Zhang D, Wang K. The relative distance of key point based iris recognition [J]. Pattern Recognition , 2007, 40:423– 430.
    [166]邬向前,王宽全,张大鹏.掌纹识别技术[M].北京:科学出版社,2006.
    [167]汪春梅,孙洪波.TMS320C5000系列DSP系统设计与开发实例[M].北京:电子工业出版社,2004.
    [168] Dongbing Pu, Changrui Du, Zhezhou Yu, Chunguang Zhou, Design of Face Recognition Door Manager System Based on DSP[C],LNCS,2005,87-97.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700