{"title":"基于数学形态学的人脸识别门禁系统设计","authors":"Xiaoqian Huang, Chao Chen, Chun Pan, Hui Liu","doi":"10.1145/3510858.3511009","DOIUrl":null,"url":null,"abstract":"Face recognition technology has its unique convenience and versatility in information security. This technology is also the product of social development. A face recognition access control system based on mathematical morphology was proposed. By pre-processing the original image, the binary image is obtained. Then the mathematical morphology of the image is used to integrate it into a face image that can locate the face. Finally, the face location is realized by extracting the eyes. Through the research, it can be found that it was convenient to realize and could be applied to the actual scene, which provided a feasible scheme for the access control system and a research basis for deep face recognition.","PeriodicalId":6757,"journal":{"name":"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of access control system using face recognition based on mathematical morphology\",\"authors\":\"Xiaoqian Huang, Chao Chen, Chun Pan, Hui Liu\",\"doi\":\"10.1145/3510858.3511009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Face recognition technology has its unique convenience and versatility in information security. This technology is also the product of social development. A face recognition access control system based on mathematical morphology was proposed. By pre-processing the original image, the binary image is obtained. Then the mathematical morphology of the image is used to integrate it into a face image that can locate the face. Finally, the face location is realized by extracting the eyes. Through the research, it can be found that it was convenient to realize and could be applied to the actual scene, which provided a feasible scheme for the access control system and a research basis for deep face recognition.\",\"PeriodicalId\":6757,\"journal\":{\"name\":\"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3510858.3511009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3510858.3511009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of access control system using face recognition based on mathematical morphology
Face recognition technology has its unique convenience and versatility in information security. This technology is also the product of social development. A face recognition access control system based on mathematical morphology was proposed. By pre-processing the original image, the binary image is obtained. Then the mathematical morphology of the image is used to integrate it into a face image that can locate the face. Finally, the face location is realized by extracting the eyes. Through the research, it can be found that it was convenient to realize and could be applied to the actual scene, which provided a feasible scheme for the access control system and a research basis for deep face recognition.