{"title":"人脸识别锁","authors":"L. Deng, Dong-liang Lee, Yi-Jen Liu","doi":"10.1109/ICITCS.2013.6717833","DOIUrl":null,"url":null,"abstract":"In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Face Recognition Lock\",\"authors\":\"L. Deng, Dong-liang Lee, Yi-Jen Liu\",\"doi\":\"10.1109/ICITCS.2013.6717833\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.\",\"PeriodicalId\":420227,\"journal\":{\"name\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2013.6717833\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.