Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
°íÂ÷¿ø ±¹ºÎÀÌÁøÆÐÅÏ°ú °áÇÕº£ÀÌ½Ã¾È ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ ¾ó±¼ÀÎÁõ ÀÓº£µðµå ½Ã½ºÅÛ ±¸Çö |
¿µ¹®Á¦¸ñ(English Title) |
Implementation of a Face Authentication Embedded System Using Highdimensional Local Binary Pattern Descriptor and Joint Bayesian Algorithm |
ÀúÀÚ(Author) |
ÇÔ½ÂÇö
¹Ú´ë¿ì
Seung-hyeon Ham
Dea-woo Park
±èµ¿ÁÖ
À̽ÂÀÍ
°¼®±Ù
Dongju Kim
Seungik Lee
Seog Geun Kang
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 21 NO. 09 PP. 1674 ~ 1680 (2017. 09) |
Çѱ۳»¿ë (Korean Abstract) |
º» ³í¹®¿¡¼´Â °íÂ÷¿ø ±¹ºÎÀÌÁøÆÐÅÏ°ú °áÇÕº£ÀÌ½Ã¾È ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ ¾ó±¼ÀÎÁõ ÀÓº£µðµå ½Ã½ºÅÛÀ» Á¦¾ÈÇÑ´Ù. ¶ÇÇÑ, Á¦¾ÈµÈ ¾Ë°í¸®Áò¿¡ ´ëÇÑ ÀÓº£µðµå ½Ã½ºÅÛÀ» ¶óÁ¸®ÆÄÀÌ 3À» ÀÌ¿ëÇÏ¿© ±¸ÇöÇÑ °á°ú¸¦ Á¦½ÃÇÑ´Ù. Á¦¾ÈµÈ ¾ó±¼ÀÎÁõ ¾Ë°í¸®Áò¿¡ ´ëÇÑ Æò°¡´Â 500¸íÀÇ ¾ó±¼ µ¥ÀÌÅÍ°¡ ÀúÀåµÈ µ¥ÀÌÅͺ£À̽º¸¦ ÀÌ¿ëÇÏ¿© ¼öÇàÇÏ¿´´Ù. ¿©±â¼ °¢°¢ÀÇ ¾ó±¼ µ¥ÀÌÅÍ´Â ÇнÀ¿ë°ú Å×½ºÆ®¿ë À̹ÌÁö·Î ±¸¼ºÇÏ¿´´Ù. ¼º´ÉÆò°¡¸¦ À§ÇÑ Ã´µµ·Î´Â ÁÖ¼ººÐºÐ¼®¹ýÀÇ Â÷¿ø¿¡ µû¸¥ ½ºÄÚ¾î ºÐÆ÷¿Í ¾ó±¼ÀÎÁõ ½Ã°£À» ÀÌ¿ëÇÏ¿´´Ù. ±× °á°ú, ÃÖÀûÈµÈ ÀÓº£µðµå ȯ°æ¿¡¼ ¿ì¼öÇÑ ¾ó±¼ÀÎÁõ ¼º´ÉÀ» °¡Áö´Â ÀÓº£µðµå ½Ã½ºÅÛÀ» »ó´ëÀûÀ¸·Î Àú·ÅÇÑ ºñ¿ëÀ¸·Î ±¸ÇöÇÒ ¼ö ÀÖÀ½À» È®ÀÎÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In this paper, an embedded system for face authentication, which exploits high-dimensional local binary pattern (LBP) descriptor and joint Bayesian algorithm, is proposed. We also present a feasible embedded system for the proposed algorithm implemented with a Raspberry Pi 3 model B. Computer simulation for performance evaluation of the presented face authentication algorithm is carried out using a face database of 500 persons. The face data of a person consist of 2 images, one for training and the other for test. As performance measures, we exploit score distribution and face authentication time with respect to the dimensions of principal component analysis (PCA). As a result, it is confirmed that an embedded system having a good face authentication performance can be implemented with a relatively low cost under an optimized embedded environment.
|
Å°¿öµå(Keyword) |
»çÀ̹öÀüÀï
±¹°¡ »çÀ̹ö¾Èº¸
»çÀ̹öº¸¾È Á¤Ã¥
¹ýÁ¤Ã¥
Cyberwarfare
National Cybersecurity
Cybersecurity Policy
Law & Policy
ÀÓº£µðµå½Ã½ºÅÛ
½Åȣó¸®
¾ó±¼ÀÎÁõ
±¹ºÎÀÌÁøÆÐÅÏ
¶óÁ¸®ÆÄÀÌ
Embedded system
signal processing
face authentication
local binary pattern
Raspberry PI
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|