Font Size: a A A

The Design Of Authentication In The Small-Scale Import And Export Monitoring Systerm

Posted on:2011-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178360305452218Subject:Measuring and Testing Technology and Instruments
Abstract/Summary:PDF Full Text Request
Today in the rapid development of information technology, we are made the updated requirements in the authenticated degree of credibility and convenience. Some of the traditional authentication methods clearly can not meet these new demands, and it has become a research hotspot by using biometrics for identity authentication.Face recognition is a pattern recognition technology in the concrete application of the image in the field, and it is very popular in its application prospect . It has been collected to facilitate the people's favoras as a typical biometric identification for its naturalness, acceptability, convenience. Identity documents can be applied to the identification, automatic access control systems, forensic detection, video surveillance, the security of home and other fields.This article describes the existing face recognition algorithm, with describing the classic image-based vector PCA face recognition algorithm in detail. Because the classical PCA algorithm identifies those shortcomings,we are presenting an improved method of M-PCA. Before the image pre-processing stage ,the recognition algorithm is done,so that we can effectively improve the recognition rate. Then, an improved 2DPCA algorithm (M-2DPCA), M-2DPCA and 2DPCA recognition rate is close to but higher than the M-PCA recognition rate. Under normal circumstances , M-2DPCA and 2DPCA recognition rate are close to each other.However, M-2DPCA and 2DPCA methods remodeling have a higher degree of spatial complexity and time complexity, so we have to spend more time in the reconstruction of memory. When the practical application of the system can not provide enough memory cases, the superiority of PCA in performance is manifested.In summary,this paper presents an improved PCA which is based in face recognition system.It uses PCA method in the process of system implementation, mainly because it can effectively improve the system recognition rate.This article is designed authentication system. In addition to the optimization algorithm, it is greater emphasis on system design, in order to play its algorithm performance.
Keywords/Search Tags:Identity verification, Face recognition, PCA algorithm
PDF Full Text Request
Related items