期刊文献+

一种优化的人脸特征数据保护算法

An optimized protection algorithm of face feature data
下载PDF
导出
摘要 针对基于SIFT的保护算法运行效率低、算法结构庞大的问题,提出一种基于SIFT人脸特征数据保护算法的优化算法.该算法通过对原算法特征数据库中的数据存放方式、数据结构的优化,提高了检索效率.该算法在AR和YALE人脸库中进行实验,结果表明,本优化算法在保证数据安全性的前提下,不降低原有算法识别率的同时,使整个识别系统的运行效率更高. Aiming at the problem that the protection algorithm based on SIFT had low operating efficiency and algorithm structure was huge, an optimization algorithm based on SIFT face feature protection algorithm was presented. This algorithm improved the efficiency of retrieval by optimizing the data storage and the data structure in the feature database of the original algorithm. The experiment was carried out on the optimized algorithm in AR and YALE face databases, the experimental results showed that the optimization algorithm ensured data security of the premise, kept recognition rate of the original algorithm, at the same time, made the recognition system more efficient.
作者 杨玉平 陈勇
出处 《郑州轻工业学院学报(自然科学版)》 CAS 2012年第3期65-68,共4页 Journal of Zhengzhou University of Light Industry:Natural Science
关键词 人脸识别 特征数据保护算法 数据安全性 SIFT face recognition protection algorithm of feature data data security SIFT
  • 相关文献

参考文献12

  • 1周玲丽,赖剑煌.人脸特征的SIFT保护算法[J].中国图象图形学报,2011,16(5):800-806. 被引量:11
  • 2Zhou Shang-Ming, John Q Gan, Francisco Septtlveda. Classifying mental tasks based on features of higher-order sta- tistics from EEG signals in braincomputer interface[ J ]. Infor Sci,2008,178 (6) : 1629.
  • 3Jing Xiaoyuan, Li Sheng, Lan Chao, et al. Color image ca- nonical correlation analysis for face feature extraction and recognition[ J]. Signal Processing,2011,91 ( 8 ) :2132.
  • 4McCool Chris, Sanchez-Riera Jordi, Marcel Sebastien. Fea- ture distribution modelling techniques for 3D face verifica- tion[ J ]. Pattern Recognition Letters,2010,31 ( 11 ) : 1324.
  • 5Ting Jo-Anne, D' Souza Aaron, Yamamoto Kenji, et al. Predicting EMG data from M1 neurons with variational bayesian least squares [ J ]. Neural Networks, 2008,21 (8) :1112.
  • 6Haddadnia Javad,Ahmadi blajid. N-feature neural network human face recognition [ J ]. Image and Vision Comp,2004, 22(12) :1071.
  • 7Gundimada Satyanadh,Asari Vijayan K, Gudur Neeharika. Face recognition in multi-sensor images based on a novel modular feature selection technique [ J ]. Infor Fusion, 2010,11(2) :124.
  • 8Azmi Ida Madieha. Bioinformatices and genetic privacy:The impact of the personal data protection act 2010 [ J ]. Comp Law & Security Review,2011,27(4) :394.
  • 9Ter Haar Frank B,Vehkamp Remco C. 3D face model fit- ting for recognition [ J ]. Lecture Notes in Comp Sci,2008, 5305:652.
  • 10Zhou Xiaoli, Bhanu Bir. Feature fusion of side face and gait for video-based human identification [ J ]. Pattern Recognition,2008,41 (3) :778.

二级参考文献18

  • 1Lindeberg T.Scale-space theory:a basic tool for analyzing structures at different scales[J].Journal of Applied Statistics,1994,21(2):224-270.
  • 2Goal N,Bebis G,Nefian A.Face recognition experiments with random projection[C]//SPIE Defense and Security Symposium.Bellingham WA,US; SPIE Press,2005:426-437.
  • 3Johnson W B,Lindenstrauss J.Extensions of Lipschitz mappings into a Hilbert space[C]//Proceedings of Conference on Modern Analysis and Probability,Contemporary Mathematics.Rhode Island,US:American Math Society,1984,(26):189-206.
  • 4Sim T,Baker S,Bsat M.The CMU Pose,Illumination,and Expression (PIE) Database of Human Faces,CMU-RI-TR-01-02[R].Pittsburgh:Robotics Institute,Carnegie Mellon University,2001.
  • 5Martinez AM,Benavente R.The AR Face Database[R].Barcelona:Computer Vision Center (CVC) Technical Report,1998.
  • 6Phillips PJ,Moon H,Rauss P,et al.The facial recognition technology (FERET) database[J].Lecture Notes in Computer Science,1993,42(3):300-311.
  • 7Ratha N K,Connell J H,Bolle R M.Enhancing security and privacy in biometrics-baaed authentication systems[J].IBM Systems Journal,2001,40(3):614-634.
  • 8Schneier B.Inside risks:the uses and abuses of biometrics[J].Communications of the ACM,1999,42(8):136.
  • 9Adler A.Images can be regenerated from quantized biometric match score data[C]//Proceedings of the Canadian Conference on Electrical and Computer Engineering.Washington USA:IEEE,2004:469-472.
  • 10Uludag U,Pankanti S,Prabhakar S,et al.Biometric cryptosystems:issues and challenges[C]//Proceedings of IEEE Conference on Multimedia Information Retrieval.Los Alamitos CA:IEEE Press,2004,92(6):948-960.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部