Font Size: a A A

The Face Recognition Technology To Achieve Its Remote Authentication

Posted on:2008-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:B S DongFull Text:PDF
GTID:2208360215450766Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Remote identification authentication is a method adopted by the server to ensure that the user's identification is authorized when the user logging on the server. Many of the computer systems based on C/S architecture need remote identification authentication. The traditional means of remote identification authentication takes use of user name and password. But this method has some disadvantages such as that the password can be stolen and decrypted. So the traditional means can not satisfy the systems needing high security.As one of the human being's biological characteristics face has many assets such as hard to be faked, can not be lost, easy to be used and so on. Face recognition has become a hotspot of pattern recognition. The technology of face recognition has become mature and can be taken into practice. Now face recognition has been applied into cracking criminal cases and entrance control. It is seems that face recognition has not been used as a method to perform remote identification authentication.This subject applies face recognition into remote identification authentication. First, some existing face detection algorithms and feature extraction algorithms are researched and analyzed and a solution of remote identification authentication based on face recognition is proposed. According to this solution, the client adopts face detection algorithm based on skin color and sends the processed face picture to the server; the server uses feature extraction algorithm based on Singular Value and FLD to extract face features, trains the face base using base space collection and takes inner class average distance as identification criteria. In the end, an instance of this solution is realized. The experiment result shows that this solution can conquer the defects of the traditional means and is applicable. This solution can be applied into the computer systems needing high security. It can provide a much more reliable and safe identification authentication mechanism. There will be wide scope and good perspective of the application of face recognition in remote identification authentication.
Keywords/Search Tags:Face recognition, Face Detection, Remote identification authentication
PDF Full Text Request
Related items