• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) °íÂ÷¿ø ±¹ºÎÀÌÁøÆÐÅÏ°ú °áÇÕº£ÀÌ½Ã¾È ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ ¾ó±¼ÀÎÁõ ÀÓº£µðµå ½Ã½ºÅÛ ±¸Çö
¿µ¹®Á¦¸ñ(English Title) Implementation of a Face Authentication Embedded System Using Highdimensional Local Binary Pattern Descriptor and Joint Bayesian Algorithm
ÀúÀÚ(Author) ÇÔ½ÂÇö   ¹Ú´ë¿ì   Seung-hyeon Ham   Dea-woo Park   ±èµ¿ÁÖ   À̽ÂÀÍ   °­¼®±Ù   Dongju Kim   Seungik Lee   Seog Geun Kang  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 09 PP. 1674 ~ 1680 (2017. 09)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â °íÂ÷¿ø ±¹ºÎÀÌÁøÆÐÅÏ°ú °áÇÕº£ÀÌ½Ã¾È ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ ¾ó±¼ÀÎÁõ ÀÓº£µðµå ½Ã½ºÅÛÀ» Á¦¾ÈÇÑ´Ù. ¶ÇÇÑ, Á¦¾ÈµÈ ¾Ë°í¸®Áò¿¡ ´ëÇÑ ÀÓº£µðµå ½Ã½ºÅÛÀ» ¶óÁ¸®ÆÄÀÌ 3À» ÀÌ¿ëÇÏ¿© ±¸ÇöÇÑ °á°ú¸¦ Á¦½ÃÇÑ´Ù. Á¦¾ÈµÈ ¾ó±¼ÀÎÁõ ¾Ë°í¸®Áò¿¡ ´ëÇÑ Æò°¡´Â 500¸íÀÇ ¾ó±¼ µ¥ÀÌÅÍ°¡ ÀúÀåµÈ µ¥ÀÌÅͺ£À̽º¸¦ ÀÌ¿ëÇÏ¿© ¼öÇàÇÏ¿´´Ù. ¿©±â¼­ °¢°¢ÀÇ ¾ó±¼ µ¥ÀÌÅÍ´Â ÇнÀ¿ë°ú Å×½ºÆ®¿ë À̹ÌÁö·Î ±¸¼ºÇÏ¿´´Ù. ¼º´ÉÆò°¡¸¦ À§ÇÑ Ã´µµ·Î´Â ÁÖ¼ººÐºÐ¼®¹ýÀÇ Â÷¿ø¿¡ µû¸¥ ½ºÄÚ¾î ºÐÆ÷¿Í ¾ó±¼ÀÎÁõ ½Ã°£À» ÀÌ¿ëÇÏ¿´´Ù. ±× °á°ú, ÃÖÀûÈ­µÈ ÀÓº£µðµå ȯ°æ¿¡¼­ ¿ì¼öÇÑ ¾ó±¼ÀÎÁõ ¼º´ÉÀ» °¡Áö´Â ÀÓº£µðµå ½Ã½ºÅÛÀ» »ó´ëÀûÀ¸·Î Àú·ÅÇÑ ºñ¿ëÀ¸·Î ±¸ÇöÇÒ ¼ö ÀÖÀ½À» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
In this paper, an embedded system for face authentication, which exploits high-dimensional local binary pattern (LBP) descriptor and joint Bayesian algorithm, is proposed. We also present a feasible embedded system for the proposed algorithm implemented with a Raspberry Pi 3 model B. Computer simulation for performance evaluation of the presented face authentication algorithm is carried out using a face database of 500 persons. The face data of a person consist of 2 images, one for training and the other for test. As performance measures, we exploit score distribution and face authentication time with respect to the dimensions of principal component analysis (PCA). As a result, it is confirmed that an embedded system having a good face authentication performance can be implemented with a relatively low cost under an optimized embedded environment.
Å°¿öµå(Keyword) »çÀ̹öÀüÀï   ±¹°¡ »çÀ̹ö¾Èº¸   »çÀ̹öº¸¾È Á¤Ã¥   ¹ýÁ¤Ã¥   Cyberwarfare   National Cybersecurity   Cybersecurity Policy   Law & Policy   ÀÓº£µðµå½Ã½ºÅÛ   ½Åȣ󸮠  ¾ó±¼ÀÎÁõ   ±¹ºÎÀÌÁøÆÐÅÏ   ¶óÁ¸®ÆÄÀÌ   Embedded system   signal processing   face authentication   local binary pattern   Raspberry PI  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå