期刊文献+

3D face recognition algorithm based on detecting reliable components 被引量:1

3D face recognition algorithm based on detecting reliable components
下载PDF
导出
摘要 Fisherfaces algorithm is a popular method for face recognition.However,there exist some unstable com- ponents that degrade recognition performance.In this paper,we propose a method based on detecting reliable com- ponents to overcome the problem and introduce it to 3D face recognition.The reliable components are detected within the binary feature vector,which is generated from the Fisherfaces feature vector based on statistical properties,and is used for 3D face recognition as the final feature vector.Experimental results show that the reliable components fea- ture vector is much more effective than the Fisherfaces feature vector for face recognition. Fisherfaces algorithm is a popular method for face recognition. However, there exist some unstable components that degrade recognition performance. In this paper, we propose a method based on detecting reliable components to overcome the problem and introduce it to 3D face recognition. The reliable components are detected within the binary feature vector, which is generated from the Fisherfaces feature vector based on statistical properties, and is used for 3D face recognition as the final feature vector. Experimental results show that the reliable components feature vector is much more effective than the Fisherfaces feature vector for face recognition.
出处 《仪器仪表学报》 EI CAS CSCD 北大核心 2007年第5期769-773,共5页 Chinese Journal of Scientific Instrument
基金 Supported by the National Natural Science Foundation of China(60671064) the Foundation for the Author of National Excellent Doctoral Dissertation of China(FANEDD-200238) the Foundation for the Excellent Youth of Heilongjiang Province the Program for New Century Excellent Talents in University(NCET-04-0330)
关键词 3D人脸识别 算法 检测 可靠度 统计特性 Fisherfaces 3D face recognition detecting reliable component Fisherfaces statistical property
  • 相关文献

参考文献20

  • 1BLEDSOE W W.The model method in facial recognition[A].Technical report PRI 15,Panoramic Research Inc.,Palo Alto,1966.
  • 2RIZVI S,PHILLIPS P,MOON H,et al.The FERET verification testing protocol for face[A].NIST Technical Report,NIST IR 6281,October 1998.
  • 3PHILLIPS P,MOON H,RIZVI S,et al.The FERET evaluation methodology for face-recognition algorithms[J].IEEE Trans.Pattern Analysis and Machine Intelligence,2000,22:1090-1103.
  • 4PHILLIPS P,GROTHER P,MICHEALS R,et al.Face recognition vendor test 2002[A].NIST Technical Report,NIST IR 6965,March 2003.
  • 5BLANZ V,VETTER T.A morphable model for the synthesis of 3D faces[C].Proc.ACM SIGGRAPH,1999:187-194.
  • 6ROMDHANI S,BLANZ V,VETTER T.Face identification by matching a 3D morphable model using linear shape and texture error functions[J].Proc.ECCV,2002,4:3-19.
  • 7ZHAO W,CHELLAPPA R.Face recognition using symmetric shape from shading[C] Proc.CVPR.2000:286-293.
  • 8ESSA I,PENTLAND A.Coding,analysis,interpretation,and recognition of facial expressions[J].IEEE Trans,PAMI 1997,19:757-763.
  • 9GORDON G.Face recognition from frontal and profile views[C].In Proceedings of the International Worksho Pon Face and Gesture Recognition June 1995:47-52.
  • 10GORDON G.Face recognition based on depth and curvature Features[C].In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition,June 1992:108-110.

同被引文献19

  • 1P Tuyls. Privacy protection of biometric templates: cryptography on noisy data[J].Revue HF(Rev.HF) ,2004,3:55 - 64.
  • 2Michiel van der Veen, Tom Kevenaar, Geert-Jan Schrijen, Ton H, Akkermans, Fei Zuo. Face biometrics with renewable templates[A]. Ping Wah Wong. Security, Steganography, and Watermarking of Multimedia Contents[C]. San Jose: SPIE, 2006. 6072 - 19.
  • 3Ann Cavoukian, Alex Stoianov. Biometric Encryption: A Positive-sum Technology That Achieves Strong Authentication, Security AND Privacy [R]. Ontario, Information and Privacy Committee of Ontario,2007.
  • 4A Juels,M Wattenberg. A fuzzy commitment scheme[ A] .Proc of the 6th ACM Conference on Computer and Communications Security[C]. New York: ACM Press. 28 - 36.
  • 5J P Linnartz, P Tuyls. New shiedling functions to enhance privacy and prevent misuse of biometric templates[A]. Proc of the 4th International Conference on Audio-and Video-Based Biometric Person Authentication [C]. Guildford, UK, 2003. 393 - 402.
  • 6E Verbitskiy,P Tuyls,D Denteneer, J P Linnartz.Reliable biometric authentication with privacy protection[ A]. Proc of the 24th Benelux Sympposium on Information Theory [C]. Veldhoven, the Netherlands, 2003. 125 - 132.
  • 7P Tuyls, J Goseling. Capacity and examples of template protecting biometric authentication systems[A]. Proc of Biometric Authentication Workshop[C]. Prague Czech Republic, 2004. 158 - 170.
  • 8P Tuyls, A M Akkerrnans, T Kevenaar, G J Schrijen, A M Bazen, R N J Veldhuis. Practical biometric authentication with template protection[A].Proc of Audio-and Video-Based Biometric Person Authentication(AVBPA) [C]. Hilton Rye Town, New York. USA.2005.436 - 446.
  • 9A Juels,M Sudan.A fuzzy vault scheme[A].Proc of IEEE International Symposium on Information Theory [ C ]. New Jersey, USA, 2002.408.
  • 10Li Qiong, Wang Zhifang, Niu Xiamu, Sun Shenghe. A verifiable fingerprint vault scheme [ J ]. Lecture Notes in computer Science-Lecture Notes in Artificial Intelligence, 2005, 3683 (3) : 1072 - 1078.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部