基于PCA和LDA算法的人脸识别

A. Bansal, K. Mehta, S. Arora
{"title":"基于PCA和LDA算法的人脸识别","authors":"A. Bansal, K. Mehta, S. Arora","doi":"10.1109/ACCT.2012.52","DOIUrl":null,"url":null,"abstract":"Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Efficient face and facial feature detection algorithms are required for applying to those tasks. Recently face recognition is attracting much attention in the society of network multimedia information access. Face recognition not only makes hackers virtually impossible to steal one's \" password\" but also increases the user-friendliness in human-computer interaction. Face recognition systems are now replenishing the need for security to cope up with the present day crime. It is really convincing with the market report which clearly depicts the growing popularity of the face recognition system. The face recognition system is proving to be very efficient in the present day market. In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. From time to time it has been noticed about the crimes of credit card fraud, computer hackings, or security breaches in a company or government building. Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"49","resultStr":"{\"title\":\"Face Recognition Using PCA and LDA Algorithm\",\"authors\":\"A. Bansal, K. Mehta, S. Arora\",\"doi\":\"10.1109/ACCT.2012.52\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Efficient face and facial feature detection algorithms are required for applying to those tasks. Recently face recognition is attracting much attention in the society of network multimedia information access. Face recognition not only makes hackers virtually impossible to steal one's \\\" password\\\" but also increases the user-friendliness in human-computer interaction. Face recognition systems are now replenishing the need for security to cope up with the present day crime. It is really convincing with the market report which clearly depicts the growing popularity of the face recognition system. The face recognition system is proving to be very efficient in the present day market. In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. From time to time it has been noticed about the crimes of credit card fraud, computer hackings, or security breaches in a company or government building. Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms.\",\"PeriodicalId\":396313,\"journal\":{\"name\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-01-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"49\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCT.2012.52\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2012.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 49

摘要

人脸及人脸特征检测在人机交互、视频监控、人脸跟踪、人脸识别等应用中发挥着重要作用。这些任务需要高效的人脸和面部特征检测算法。近年来,人脸识别技术在网络多媒体信息获取社会中备受关注。人脸识别不仅使黑客几乎不可能窃取一个人的“密码”,而且还增加了人机交互的用户友好性。面部识别系统现在正在补充对安全的需求,以应对当今的犯罪。这份市场报告很有说服力,它清楚地描绘了人脸识别系统的日益普及。人脸识别系统在当今的市场上被证明是非常有效的。在当今网络化的世界中,维护信息或物理财产安全的需求变得越来越重要,也越来越困难。人们不时会注意到信用卡欺诈、计算机黑客攻击或公司或政府大楼的安全漏洞等犯罪行为。由于最近的恐怖主义事件危险地暴露了当今安全机制的缺陷和弱点,政府机构正在投入大量资源来改善安全系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Face Recognition Using PCA and LDA Algorithm
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Efficient face and facial feature detection algorithms are required for applying to those tasks. Recently face recognition is attracting much attention in the society of network multimedia information access. Face recognition not only makes hackers virtually impossible to steal one's " password" but also increases the user-friendliness in human-computer interaction. Face recognition systems are now replenishing the need for security to cope up with the present day crime. It is really convincing with the market report which clearly depicts the growing popularity of the face recognition system. The face recognition system is proving to be very efficient in the present day market. In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. From time to time it has been noticed about the crimes of credit card fraud, computer hackings, or security breaches in a company or government building. Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信