Font Size: a A A

Research On Embed Face Recognition Access Control System

Posted on:2013-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:N WeiFull Text:PDF
GTID:2248330395463142Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, society is the age that science and technology is rapid developing and information is broad disseminated. People want a more comfortable and secure living environment with the help of science and technology while they perceive the high-tech is coming along. Since he intelligent building was proposed, the access control system, which is the important part of intelligent building, has been rapid developing. Because of the need of close contacts and prone to loss, damage, and replication, old access control systems, such as the traditional mechanical locks and single-chip processor control card access control system, can no longer meet the needs of humen live. How to guard against theft more effectively become an issue of concern. As the development of computer technology and pattern recognition technology, biometric technology has been a key technology for high-performance security systems.Face recognition technology, one of the biometric technologies, refers to facial feature analysis for identity authentication technology. Access control systems produced by using face recognition technology and embedded technologies, have a good application in industrial production, public security and justice, home life, companymart and application areas such as bank vaults., and greatly meet the needs of people’s lives.In this paper, access control system based on face recognition is studied and designed. After introducing development in the world, it makes a systematic exposition of face recognition algorithms in the system at the first. What is more, it also analyzes the functional requirements of the laboratory access control system and makes the general design of the system hardware. And then, select appropriate chip based on the general design block diagram, draw circuit diagrams of various modules. At the last, provide an overview of embedded operating systems, select Linux as the operating system of the system, and introduce the set up of the cross-compile environment and the generation of file system in details, finally successfully set up the embedded software platform. In the last chapter, describe the development and the transplantation process of drivers. In contrast of the access control system which uses a PC or simple microcontroller control chip to control, this system is more streamlined, intelligent, timeliness, easy to expand and low cost.
Keywords/Search Tags:Face recognition, embed teconology, access control system, Linux
PDF Full Text Request
Related items