Research of improving of recognition ability in Face recognition system
Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint, a palm print, and muscular currents are researched as a password. In this research, pay attention to the face image recognition. It is easy for all men to have, and to handle the face very near oneself for man. The comparison experiment concerning passage and the illumination condition of days is done by using the software, which is researched and developed in the United States, named FaceIt, the possibility and the problem to an individual attention which uses the face image recognition are examined. - i -
............ EM Expectation Maximization................................................ True Face......... 2........................ - ii -
............... 2..................... - iii -
- - infrastructure
- - 2
1.5 infrastructure EM Expectation Maximization (1) ( 2 ) 0 - -
1990 (2) EM Expectation Maximization EM (3) - -
(4) ( ) 50 1000 92.2% Goudail 116 11600 99.9% Log-Polar (5) MMP Massively Paralell ProcessingPDP Paralell Distributed Processing - -
(6) 2.1 2.1 - -
n+1 n 2.2 - -
2.3 2.3 2.2 (7) (8) - -
Back Propagation (GA) Back Propagation 30 30 100 (9) BP Back Propagation BP 1986 2.4 BP (10) - -
2.4 - -
equalize (0-255 ) ( ) normalize ( ) 10x10(100 ) 20x20(400 ) normalize normalize normalize normalize normalize normalize Equalize equalize (equalize ) equalize Normalize (11) - -
8 3 '99 (12)(13)(14) CCD charge-coupled device AD-CCDF2 Windows98 AD-CCDF2 USB 25 CCD PC PC( ) CCD 5 (15) - -
Access Log &.. DES(Data Encryption Standard) 1977 1981 ANSI( ) IBM 56 DES 99 1 22 15 1997 AES (17) - -
(16) [User List] [User List] [View User List] [User List] Access Key Access Key 5 [User List] (16) User List User Access Key Access Key Access Key 3.1 User List 3.1 User List - -
3.2 Access Log [Access Granted] [Access Denied] [Face Not Found] YYYYMM YYYY= MM= (16) 3.2 Access Log - -
Visionics Corporation (16) True Face True Face True Face True Face CCD USB 500,000 ICSA International Computer Security Association 1 2 (18) - -
3.3 3.3 - -
A B 4.1 4.1 4.1 2 sample - -
sample 30 4.2 4.2 - -
User List 9 4.3 - -
4.3 60W 2 4.4 4.7 4.4 - -
4.5 4.6 - -
4.7 - -
5.1 1 5.1 1 - -
5.2 5.2 5.3 5.3 B - -
5.4 5.4 1 5.5 1 5.5 5.6 - -
5.6 Closest Name 5.7 5.7 5.8 - -
- - 5.8 ( ) 5.9 5.10 5.9 5.10 1
6.1 6.1 6.3 6.1 - -
6.2 6.3 6.4 6.2 6.3 6.5 6.10 Transaction # Date Security - -
Level Security Threshold Closest Name Account 6.5 6.6 - -
6.7 6.8 6.8 - -
6.9 6.10 - -
6.4 6.11 6.11 6.12 6.13 6.14 18 28 64.3 0 8 28 28.6 6 10 60 7 11 63.6 1 11 9.1 2 28 7.1 4 10 40 4 11 36.4 10 11 90.9 6.12 - -
6.13 6.14 - -
2 7.1 1 7.1 7.2 7.4 1 - -
1 7.2 7.3 7.4 10 7.5 2 7.5 2 - -
2 60W 0 75 7.89 3 2 - -
- -
9.1 9.1 155 50% 50% 33% 15% 9.2 9.3 - -
9.2 9.3 - -
9.2 9.1 2 - -
- -
11 5 14 http://www.etl.go.jp/%7ekurita/lecture/statimage/statimage.html 11 5 14 http://www.elt.go.jp/%7ekurita/lecture/statimage/node27.html 11 5 14 http://www.elt.go.jp/%7ekurita/lecture/statimage/node33.html 11 5 14 http://www.etl.go.jp/%7ekurita/lecture/statimage/node37.html 11 5 14 http://www.etl.go.jp/%7ekurita/lecture/statimage/node23.html pp.3 7 1998 http://www.neuro.sfc.keio.ac.jp/~ohkita/novel/98final/section1.html 1998 http://www.neuro.sfc.keio.ac.jp/~ohkita/novel/98final/ http://sci.hirosaki-u.ac.jp/%7eninsiki/nakahata/abstract.html http://www.eml.ele.cst.nihon-u.ac.jp/~hiroshi/argo/3.html http://www.me.ics.saitama-u.ac.jp/~hidai/face/photography-and-preprocessing/ http://www.omron.co.jp/press/98/9808haikai.html [PC WEEK/JAPAN] from PC WEEK WIRE August 5 http://www.zdnet.co.jp/pcweek/web_wire/9808/06/p-010.html - -
http://www.pc.mycom.co.jp/pcwork/hotweb/1998/08/98080502.htm http://pcweb.mycom.co.jp/news/1999/10/01/32.html FaceIt PC PGP http://leo.denshi.numazu-ct.ac.jp/~tsuboi/ango/report/ True Face - -