Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 57-62.doi: 10.11896/jsjkx.200900218
• Image Processing & Multimedia Technology • Previous Articles Next Articles
ZHOU Jun1,2, WANG Shuai3, LIU Fan-yi4
CLC Number:
[1] TIAN Q C,ZHANG R S.Overview of biometric recog-nition technology [J].Computer Application Research,2010,26(12):4401-4410. [2] DAUGMAN J.High confidence visual recognition of persons by a test of statistical independence[J],IEEE Transactions on Pattern Analysis Machine Intelligence,1993,15(11):1148-1161. [3] WILDES R,ASMUTH J C.A system for automated iris recognition[C]//Proceedings of the 2nd IEEE Workshop on Applicant Computer Vision.Sarasota,FL USA,1994:121-128. [4] HE F,HAN Y,WANG H,et al.Deep learning architecture for iris recognition based on optimal Gabor filters and belief network[J].Journal of Electronic Imaging,2017,26(2):023005. [5] YANG X,ZHU X D,LIU Y N,et al.Iris recognition methodbased on block wavelet feature combined with BP neural network [J].Computer Engineering and Applications,2019,55(18):132-139. [6] ZHENG Y P,LI G Y,LI Y.A review of research on the application of deep learning in image recognition[J].Computer Engineering and Applications,2019,55(12):20-36. [7] LIMS S,LEE K,BYEON O,et al.Efficient iris recognitionthrough improvement of feature vector and classifier[J].ETRI Journal,2001,23(2):61-70. [8] BOLES W W,BOASHASH B.A human identification techni-que using images of the iris and wavelet transform[J].IEEE Transactions on Signal Processing,1998,46(4):1185-1188. [9] BAIY C.Research on iris recognition method of visible lightmobile terminal [D].Shenyang:Shenyang University of Technology,2019. [10] KANG B J,PARK K R.A robust eyelash detection based on iris focus assessment [J].Pattern Recognition,2007,28(13):1630-1639. [11] DAUGMAN J.Statistical richness of visual phase information:Update on recognizing persons by iris patterns[J].International Journal of Computer Vision,2001,45(1):25-38. [12] MA L,TAN T,WANG Y,et al.Personal Recognition Based on Iris Texture Analysis[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2003,25(12):1519-1533. [13] MASEK L.Recognition of human iris patterns for biometricidentification[R].Technical Report,School of Computer Science and Software Engineering,University of Western Australia,2003. [14] YANG J G.Wavelet analysis and its engineering application[M].Beijing:Mechanical Industry Press,2009. [15] SUNG H,LIM J,PARK J.Iris Recognition Using CollaretteBoundary Localization[C]//Proceedings of the 17th International Conference on Pattern Recognition.Washington,DC,USA 2004:857-860. [16] FU H Z,XU Y W,LIN S,et al.Angle-Closure Detection in Anterior Segment OCT Based on Multilevel DeepNetwork[J].IEEE Transactions on Cybernetics,2020,50(7). [17] LIU S,LIU Y N,ZHU X D,et al.Iris double recognition based on modified evolutionary neural network[J].Journal of Electronic Imaging,2017,26(6):063023. [18] TIAN Q C.Principle and Algorithm of Iris Recognition [M].Beijing:National Defense Industry Press,2010. [19] JIANG H,MENG D T.Iris recognition based on CS-LBPand adaptive neural network[J].Journal of Northeast Normal University (Natural Science Edition),2018,50(3):58-64. [20] Institute of Automation,Chinese Academy of Sciences.CASIA iris image database [EB/OL].(2007-12-23).http://www.cbsr.ia.ac.cn/English/Irisdatabase.asp. |
[1] | WANG Kun-shu, ZHANG Ze-hui, GAO Tie-gang. Reversible Hidden Algorithm for Remote Sensing Images Based on Hachimoji DNA and QR Decomposition [J]. Computer Science, 2022, 49(8): 127-135. |
[2] | YANG Bo, LI Yuan-biao. Complex Network Analysis on Curriculum System of Data Science and Big Data Technology [J]. Computer Science, 2022, 49(6A): 680-685. |
[3] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[4] | XU Ru-li, HUANG Zhang-can, XIE Qin-qin, LI Hua-feng, ZHAN Hang. Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy [J]. Computer Science, 2022, 49(6): 231-237. |
[5] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
[6] | DONG Xiao-mei, WANG Rui, ZOU Xin-kai. Survey on Privacy Protection Solutions for Recommended Applications [J]. Computer Science, 2021, 48(9): 21-35. |
[7] | WANG Ying-li, JIANG Cong-cong, FENG Xiao-nian, QIAN Tie-yun. Time Aware Point-of-interest Recommendation [J]. Computer Science, 2021, 48(9): 43-49. |
[8] | YANG Hong-xin, SONG Bao-yan, LIU Ting-ting, DU Yue-feng, LI Xiao-guang. Tensor Completion Method Based on Coupled Random Projection [J]. Computer Science, 2021, 48(8): 66-71. |
[9] | YAO Juan, XING Bin, ZENG Jun, WEN Jun-hao. Survey on Cloud Manufacturing Service Composition [J]. Computer Science, 2021, 48(7): 245-255. |
[10] | ZHONG Yue, FANG Hu-sheng, ZHANG Guo-yu, WANG Zhao, ZHU Jing-wei. Method of CNN Flag Movement Recognition Based on 9-axis Attitude Sensor [J]. Computer Science, 2021, 48(6): 153-158. |
[11] | HAO Zhi-feng, LIAO Xiang-cai, WEN Wen, CAI Rui-chu. Collaborative Filtering Recommendation Algorithm Based on Multi-context Information [J]. Computer Science, 2021, 48(3): 168-173. |
[12] | JIANG Zheng, WANG Jun-li, CAO Rui-hao, YAN Chun-gang. Method of Service Decomposition Based on Microservice Architecture [J]. Computer Science, 2021, 48(12): 17-23. |
[13] | ZHAO Dong-mei, SONG Hui-qian, ZHANG Hong-bin. Network Security Situation Based on Time Factor and Composite CNN Structure [J]. Computer Science, 2021, 48(12): 349-356. |
[14] | ZHAO Man, ZHAO Jia-kun, LIU Jin-nuo. Link Prediction Algorithm Based on Ego Networks Structure and Network Representation Learning [J]. Computer Science, 2021, 48(11A): 211-217. |
[15] | ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45. |
|