Face database security information verification based on recognition technology

被引:0
|
作者
Xue, Shumin [1 ]
机构
[1] School of Computer Science and technology, Baoji University of Arts and Sciences, No.42 mailbox, Baoji, Shaanxi,721016, China
来源
关键词
D O I
10.6633/IJNS.201907_21(4).09
中图分类号
学科分类号
摘要
引用
收藏
页码:601 / 606
相关论文
共 50 条
  • [31] The face recognition security entrance
    Ni, CW
    INPUT/OUTPUT AND IMAGING TECHNOLOGIES II, 2000, 4080 : 48 - 54
  • [32] Face Recognition Security System
    Department of Computer and Communications Engineering, American University of Science and Technology , Beirut, Lebanon
    Lect. Notes Electr. Eng., (343-348): : 343 - 348
  • [33] Face recognition technology
    Voth, D
    IEEE INTELLIGENT SYSTEMS, 2003, 18 (03): : 4 - 7
  • [34] CIRCUIT RECOGNITION AND VERIFICATION BASED ON LAYOUT INFORMATION.
    Ablasser, I.
    Jaeger, U.
    Proceedings - Design Automation Conference, 1981, : 684 - 689
  • [35] Security grid technology based on information security control theory
    Yuan, Jia-Bin
    Gu, Kai-Kai
    Yao, Li
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (04): : 422 - 425
  • [36] Security precautionary technology for enterprise information resource database based on genetic algorithm in age of big data
    Chen, Guiping
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2020, 20 (02) : 427 - 434
  • [37] Based on the research of WSN in information security technology
    Zhao, Ke
    Xiao, LongFei
    Hu, YaLong
    Wang, Zhong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5976 - 5978
  • [38] Research on Information Security Technology Based on Blockchain
    Liu, Liang
    Xu, Budong
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 380 - 384
  • [39] ID Photo Verification by Face Recognition
    Praveenbalaji, D.
    Srinivas, R.
    Roopa, S.
    Suresh, M.
    Gayathri, A.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1449 - 1453
  • [40] Information security technology based on DNA computing
    Cui, Guangzhao
    Qin, Limin
    Wang, Yanfeng
    Zhang, Xuncai
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 288 - +