Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 127-132.doi: 10.11896/j.issn.1002-137X.2016.11A.027

Previous Articles     Next Articles

Research on Application of Face Recognition in Area of Public Security

XIAO Jun   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The face recognition has made certain achievements in the practice of public security,which has used the methods of the principal component analysis,projection drawing and characterization matching,facial symmetry restoration,3D face similarity evaluation within iso-geodesic regions and hidden markov model.Some conundrums have been exposed more clearly,including inherent flaw of some algorithms,being magnified,gap between theoretical research and practical use,lack of specialized technical personnel for research and development and operation of the face recognition system.In order to build a complete and advanced public security system based on face recognition,the tasks such as developing algorithms to increase recognition rate,combining into other bio-recognizable technologies to enhance stringency,improving the hardware conditions to provide support,promoting convergence of theory research and practical application and training a team of specialized technical personnel along with improving the expertise and operational skills of the involving police-persons should be done.

Key words: Face recognition,Application of technology,Field of public security,Algorithm

[1] 苏剑波,徐波.应用模式识别技术导论:人脸识别与语音识别[M].上海:上海交通大学出版社,2001
[2] Shapiro L G,Stockman G C.Computer Vision[M].Englewood Cliffs,NJ:Prentice-Hall,2001
[3] 沈理.人脸识别原理及算法:动态人脸识别系统研究[M].北京:人民邮电出版社,2014
[4] Kember S.Face Recognition and the Emergence of Smart Photography[J].Journal of Visual Culture,2014(2):182-199
[5] Kanade T.Picture Processing by Computer Complex and Recognition of Human Faces[D].Kyoto:Kyoto University,1973
[6] Lee Y H,Ahn H.Advanced Face Recognition and Verification in Mobile Platforms[J].Journal of Systems and Information Technology,2014(2):126-137
[7] Kakadiaris I,Passalis G,Toderici G,et al.Three-DimensionalFace Recognition in the Presence of Facial Expressions:An Annotated Deformable Model Approach[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2007(4):640-649
[8] Kemelmacher-Shlizerman I,Basri R.3D Face Reconstructionfrom a Single Image Using a Single Reference Face Shape[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011(2):394-405
[9] Passalis G,Perakis P,Theoharis T,et al.Using Facial Symmetry to Handle Pose Variations in Real-World 3D Face Recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011(10):1938-1950
[10] Samaria F,Young S.HMM Based Architecture for Face Recognition[J].Image and Computer Vision,1994(8):537-543
[11] 王寻,赵怀勋.基于改进的肤色空间和几何特征的快速人脸检测研究[J].计算机应用与软件,2015(2):151-154
[12] 周威,毛力,赵鹏洋,等.基于MB_LBP和PCA算法的人脸识别研究[J].中国管理信息化,2016(13):181-182
[13] Hiremath P S,Hiremath M.3D Face Recognition Based On Radon Transform,PCA,LDA Using KNN and SVM[J].International Journal of Image Graphics and Signal Processing,2014,6(7):36-43
[14] Ghinea G,Kannan R,Kannaiyan S.Gradient-Orientation-Based PCA Subspace for Novel Face Recognition[J].IEEE Access,2014(2):914-920
[15] 胡敏艳,孙杳如.基于局部特征的三维人脸识别[J].现代计算机,2016(2):33-38
[16] 顾伟,刘文杰,朱忠浩,等.一种基于肤色模型和模板匹配的人脸检测算法[J].微型电脑应用,2014(7):13-16
[17] 陈宁,姚楚楚.基于图匹配的人脸识别算法[J].纺织高校基础科学学报,2016(1):105-109
[18] Shin H C,Park J H,Kim S D.Combination of Warping Robust Elastic Graph Matching and Kernel-Based Projection Discriminant Analysis for Face Recognition[J].IEEE Transactions on Multimedia,2007(6):1125-1136
[19] Feeza R,Mohamed K H.Convolutional Neural Network forFace Recognition with Pose and Illumination Variation[J].International Journal of Engineering and Technology,2014(1):44-57
[20] 陈耀丹,王连明.基于卷积神经网络的人脸识别方法[J].东北师大学报(自然科学版),2016(2):70-76
[21] Kasar M M,Bhattacharyya D,Kim T H.Face Recognition Using Neural Network:A Review[J].International Journal of Security and Its Applications,2016(3):81-100
[22] Turk M A,Pentland A P.Face recognition using eigenfaces[J].IEEE Computer Society Conference on Computer Vision and Pattern Recognition,1991(6):586-591
[23] Liu C,Shun H Y,Zhang C H.A two-step approach to hallucinating faces:Global parametric model and local nonparametric model[J].IEEE Computer Society Conference on Computer Vision and Pattern Recognition,2001(1):192-198
[24] Nefian A V,M H H.Face detection and recognition using hidden Markov models[J].IEEE International Conference on Image Processing,1998(1):141-145
[25] Tu J L,Tao H,Huang T.Face as mouse through Visual facetracking[J].Computer Vision and Image Understanding,2010(1):35-40
[26] Gerard Medioni,Isaac Cohen.Event detection and analysis from video stream[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2010(8):873-875
[27] Nefian A.A Hidden Markov Model-Based Approach for Face De-tection and Recognition[D].Georgia:Georgia Institute of Technology,1999
[28] Bobulski J.2DHMM-Based Face Recognition Method[J].Image Processing and Communications Challenges,2016(1):11-18
[29] Arya K V,Anukriti.Face recognition under partial occlusionusing HMM and Face Edge Length Model[R].The 9th International Conference on Industrial and Information Systems(ICIIS),2014
[30] 李忠健,杨宜民,梅平.基于改进的隐马尔科夫模型的人脸识别方法[J].工业控制计算机,2014(11):29-31
[31] William H,William T,Brian P.Numerical recipes in C:the art of scientific computing[M].New York:Cambridge University Press,1986
[32] Rowley H A,Baluja S,Kanade T.Neural Network-Based Face Detection[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,1998(1):23-38
[33] Raptis M,Kirovski D,Hoppe H.Real-time classification ofdance gestures from skeleton animation[J].Eurographics/ACM Siggraph Symposium on Computer Animation,2011(2):147-156
[34] Oluwatoyin P.Popoola,Kejun Wang.Video-Based AbnormalHuman Behavior Recognition—A Review[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C (Applications and Reviews),2012(6):865-878

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .