• 我想回东北
    了解作者
  • Visual C++
    开发工具
  • 280KB
    文件大小
  • rar
    文件格式
  • 0
    收藏次数
  • 1 积分
    下载积分
  • 2
    下载次数
  • 2010-04-15 10:02
    上传日期
印度人写的,用结合了DCT离散余弦变换和PCA住向量分析的方法,并对各个方法加以比较
cong.rar
  • IEEEXplore.pdf
    294.4KB
内容介绍
<html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta charset="utf-8"> <meta name="generator" content="pdf2htmlEX"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css"> <link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css"> <link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/6247201d62b5053d3c2a43f8/raw.css"> <script src="https://static.pudn.com/base/js/compatibility.min.js"></script> <script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script> <script> try{ pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({}); }catch(e){} </script> <title></title> </head> <body> <div id="sidebar" style="display: none"> <div id="outline"> </div> </div> <div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6247201d62b5053d3c2a43f8/bg1.jpg"><div class="t m0 x1 h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">A Multi-Algorithmic Face Recognition System </div><div class="t m0 x2 h3 y2 ff1 fs1 fc0 sc0 ls1 ws1">#Soumitra Kar, Swati Hiremath, Dilip G. Joshi, Vinod.K.Chadda and<span class="_ _0"></span> </div><div class="t m0 x3 h4 y3 ff1 fs2 fc0 sc0 ls2 ws2">1</div><div class="t m0 x4 h3 y2 ff1 fs1 fc0 sc0 ls3 ws3">Apurva Bajpai </div><div class="t m0 x5 h5 y4 ff2 fs3 fc0 sc0 ls4 ws4">EISD, BARC, Mumbai-400 085,<span class="_ _0"></span> India </div><div class="t m0 x6 h5 y5 ff2 fs3 fc0 sc0 ls5 ws2">skar@barc.go<span class="_ _0"></span>v.in </div><div class="t m0 x7 h6 y6 ff3 fs3 fc0 sc0 ls6 ws2">Abstract </div><div class="t m0 x8 h5 y7 ff2 fs3 fc0 sc0 ls7 ws5">The impo<span class="_ _1"></span>rtance of<span class="_ _1"></span> utilisi<span class="_ _1"></span>ng biomet<span class="_ _1"></span>rics t<span class="_ _1"></span>o establish<span class="_ _1"></span> personal </div><div class="t m0 x8 h5 y8 ff2 fs3 fc0 sc0 ls8 ws6">authentic<span class="_ _0"></span>ity and to de<span class="_ _0"></span>tect impostors<span class="_ _0"></span> is growing in <span class="_ _0"></span>the present </div><div class="t m0 x8 h5 y9 ff2 fs3 fc0 sc0 ls9 ws7">scenario of global secur<span class="_ _0"></span>ity concern. Developm<span class="_ _0"></span>ent of a </div><div class="t m0 x8 h5 ya ff2 fs3 fc0 sc0 lsa ws8">biometric system <span class="lsb ws9">for personal identification, which fulfills the </span></div><div class="t m0 x8 h5 yb ff2 fs3 fc0 sc0 lsc wsa">requirements for access control of secured areas and other </div><div class="t m0 x8 h5 yc ff2 fs3 fc0 sc0 ls5 wsb">applicati<span class="_ _0"></span>ons like identity val<span class="_ _0"></span>idation for social we<span class="_ _0"></span>lfare, crime </div><div class="t m0 x8 h5 yd ff2 fs3 fc0 sc0 lsd wsc">detection, ATM access, comp<span class="_ _1"></span>uter securit<span class="_ _1"></span>y, etc. is felt to be the </div><div class="t m0 x8 h5 ye ff2 fs3 fc0 sc0 lse wsd">need of the day<span class="_ _0"></span>. Face recogn<span class="_ _0"></span>ition has bee<span class="_ _0"></span>n evolving as<span class="_ _0"></span> a </div><div class="t m0 x8 h5 yf ff2 fs3 fc0 sc0 lsf wse">convenie<span class="_ _0"></span>nt biometric mode for human authe<span class="_ _0"></span>ntication<span class="_ _0"></span> for </div><div class="t m0 x8 h5 y10 ff2 fs3 fc0 sc0 ls8 wsf">more tha<span class="_ _0"></span>n last two dec<span class="_ _0"></span>ades. Several ven<span class="_ _0"></span>dors aroun<span class="_ _0"></span>d the </div><div class="t m0 x8 h5 y11 ff2 fs3 fc0 sc0 ls10 ws10">world clai<span class="_ _1"></span>m the s<span class="_ _1"></span>uccessf<span class="_ _1"></span>ul wor<span class="_ _1"></span>king of<span class="_ _1"></span> their fac<span class="_ _1"></span>e recogni<span class="_ _1"></span>tion </div><div class="t m0 x8 h5 y12 ff2 fs3 fc0 sc0 ls11 ws11">systems. However, the Face Recognition Vendor Test </div><div class="t m0 x8 h5 y13 ff2 fs3 fc0 sc0 ls8 ws12">(FRVT) condu<span class="_ _0"></span>cted by the Nationa<span class="_ _0"></span>l Institute of St<span class="_ _0"></span>andards and<span class="_ _0"></span> </div><div class="t m0 x8 h5 y14 ff2 fs3 fc0 sc0 ls12 ws13">Technology (<span class="_ _0"></span>NIST), USA, indic<span class="_ _0"></span>ates that the commercial face </div><div class="t m0 x8 h5 y15 ff2 fs3 fc0 sc0 ls13 ws14">recognition systems do not <span class="ls14 ws15">perform up to t<span class="_ _0"></span>he mark under the </span></div><div class="t m0 x8 h5 y16 ff2 fs3 fc0 sc0 ls15 ws16">variations ub<span class="_ _0"></span>iquitously pre<span class="_ _0"></span>sent in a real-<span class="_ _0"></span>life situation.<span class="_ _0"></span> </div><div class="t m0 x8 h5 y17 ff2 fs3 fc0 sc0 ls16 ws17">Availabilit<span class="_ _1"></span>y of a largely accepted robust face reco<span class="_ _1"></span>gnition </div><div class="t m0 x8 h5 y18 ff2 fs3 fc0 sc0 ls17 ws18">system has proved elusi<span class="_ _1"></span>ve so far. Keep<span class="_ _1"></span>ing in view th<span class="_ _1"></span>e </div><div class="t m0 x8 h5 y19 ff2 fs3 fc0 sc0 ls18 ws19">importance of indige<span class="_ _0"></span>nous developmen<span class="_ _0"></span>t of biometric systems </div><div class="t m0 x8 h5 y1a ff2 fs3 fc0 sc0 ls19 ws1a">to cater to the requirements at<span class="_ _1"></span> BARC and elsewhere in th<span class="_ _1"></span>e </div><div class="t m0 x8 h5 y1b ff2 fs3 fc0 sc0 ls1a ws1b">country, the work was <span class="_ _0"></span>started <span class="_ _0"></span>on the devel<span class="_ _0"></span>opment of a face-</div><div class="t m0 x8 h5 y1c ff2 fs3 fc0 sc0 ls1b ws1c">based bi<span class="_ _0"></span>ometric authentic<span class="_ _0"></span>ation system.<span class="_ _0"></span> In this paper, we<span class="_ _0"></span> </div><div class="t m0 x8 h5 y1d ff2 fs3 fc0 sc0 ls12 ws1d">discuss our efforts in developing a face recognition syst<span class="_ _0"></span>em </div><div class="t m0 x8 h5 y1e ff2 fs3 fc0 sc0 ls1c ws1e">that functions<span class="_ _0"></span> successfully <span class="_ _0"></span>under a reasonably c<span class="_ _0"></span>onstrained </div><div class="t m0 x8 h5 y1f ff2 fs3 fc0 sc0 ls1d ws1f">set-up for facial image acqu<span class="lsc ws20">isition. The <span class="ls1e ws21">prototype system </span></span></div><div class="t m0 x8 h5 y20 ff2 fs3 fc0 sc0 ls1f ws22">built in our l<span class="_ _1"></span>ab finds facia<span class="_ _1"></span>l match by util<span class="_ _1"></span>izing multi<span class="_ _1"></span>-</div><div class="t m0 x8 h5 y21 ff2 fs3 fc0 sc0 ls1b ws23">algorithmic<span class="_ _0"></span> multi-biome<span class="_ _0"></span>tric technique, co<span class="_ _0"></span>mbining gray level<span class="_ _0"></span> </div><div class="t m0 x8 h5 y22 ff2 fs3 fc0 sc0 lsf ws24">statistical co<span class="_ _0"></span>rrelation me<span class="_ _0"></span>thod with Princ<span class="_ _0"></span>ipal Component<span class="_ _0"></span> </div><div class="t m0 x8 h5 y23 ff2 fs3 fc0 sc0 ls20 ws25">Analysis (PC<span class="_ _0"></span>A) or Discrete Cosine <span class="_ _0"></span>Transform (DCT<span class="_ _0"></span>) <span class="_ _2"></span> </div><div class="t m0 x8 h5 y24 ff2 fs3 fc0 sc0 ls4 ws26">techniques in order to boost<span class="_ _0"></span> our system performance. Afte<span class="_ _0"></span>r </div><div class="t m0 x8 h5 y25 ff2 fs3 fc0 sc0 lsf ws27">automatic de<span class="_ _0"></span>tection of the<span class="_ _0"></span> face in the image an<span class="_ _0"></span>d its gross </div><div class="t m0 x8 h5 y26 ff2 fs3 fc0 sc0 ls1d ws28">scale correction, its PCA and DCT signature<span class="_ _0"></span>s are extracte<span class="_ _0"></span>d. </div><div class="t m0 x8 h5 y27 ff2 fs3 fc0 sc0 ls1c ws29">Based on a comparison of the ex<span class="_ _0"></span>tracted signature with the set </div><div class="t m0 x8 h5 y28 ff2 fs3 fc0 sc0 lsb ws2a">of references, the se<span class="_ _0"></span>t of top five hits are selected.<span class="_ _0"></span> Exact scale </div><div class="t m0 x8 h5 y29 ff2 fs3 fc0 sc0 ls21 ws2b">of the face<span class="_ _0"></span> is ascertaine<span class="_ _0"></span>d w.r.t. each <span class="_ _0"></span>of these hits by f<span class="_ _0"></span>irst </div><div class="t m0 x8 h5 y2a ff2 fs3 fc0 sc0 lsf ws2c">locating t<span class="_ _0"></span>he eyes employi<span class="_ _0"></span>ng template ma<span class="_ _0"></span>tching tech<span class="_ _0"></span>nique and </div><div class="t m0 x8 h5 y2b ff2 fs3 fc0 sc0 ls13 ws2d">then finding the inter-<span class="_ _0"></span>ocular distance. After interpolating the </div><div class="t m0 x8 h5 y2c ff2 fs3 fc0 sc0 ls13 ws2e">face to the exa<span class="_ _0"></span>ct scale, matching scores <span class="_ _0"></span>are computed base<span class="_ _0"></span>d </div><div class="t m0 x8 h5 y2d ff2 fs3 fc0 sc0 ls8 ws2f">on gray level corre<span class="_ _0"></span>lation of a number <span class="_ _0"></span>of features on the<span class="_ _0"></span> face. </div><div class="t m0 x8 h5 y2e ff2 fs3 fc0 sc0 ls22 ws30">Final iden<span class="_ _0"></span>tification dec<span class="_ _0"></span>ision is taken amongs<span class="_ _0"></span>t this set of five </div><div class="t m0 x8 h5 y2f ff2 fs3 fc0 sc0 ls1f ws31">faces, dependin<span class="_ _1"></span>g on the highest score. We have test<span class="_ _1"></span>ed the </div><div class="t m0 x8 h5 y30 ff2 fs3 fc0 sc0 ls23 ws32">techniqu<span class="_ _1"></span>e on a set of 109<span class="_ _1"></span> images bel<span class="_ _1"></span>onging to<span class="_ _1"></span> 43 subject<span class="_ _1"></span>s, <span class="_ _3"></span> </div><div class="t m0 x8 h5 y31 ff2 fs3 fc0 sc0 ls24 ws33">both male and f<span class="_ _1"></span>emale. The result on th<span class="_ _1"></span>is image-set indicates<span class="_ _1"></span> </div><div class="t m0 x8 h5 y32 ff2 fs3 fc0 sc0 ls12 ws34">89% success rate of <span class="_ _0"></span>our technique.</div><div class="t m0 x8 h7 y33 ff1 fs4 fc0 sc0 ls2 ws2">1</div><div class="t m0 x9 h8 y34 ff1 fs3 fc0 sc0 ls25 ws35">Deputed to BARC by ECIL for this project. </div><div class="t m0 xa h6 y35 ff3 fs3 fc0 sc0 ls4 ws36">Index Terms </div><div class="t m0 xb h8 y36 ff1 fs3 fc0 sc0 ls26 ws37"> <span class="_ _4"></span>Face recognition, I<span class="_ _0"></span>dentifi<span class="ls2 ws38">cation, Multi-algorithmic, Multi-</span></div><div class="t m0 xb h8 y37 ff1 fs3 fc0 sc0 ls1a ws39">biometric, Discrete C<span class="_ _0"></span>osine Transform, Principa<span class="_ _0"></span>l Component </div><div class="t m0 xb h8 y38 ff1 fs3 fc0 sc0 ls1b ws3a">Analysis, Correlati<span class="_ _0"></span>on. </div><div class="t m0 xc h6 y39 ff3 fs3 fc0 sc0 ls27 ws2">1.<span class="_ _5"> </span>INTRODUCTION </div><div class="t m0 xb h8 y3a ff1 fs3 fc0 sc0 lse ws3b"> <span class="_ _4"></span>Biometrics m<span class="_ _0"></span>akes autom<span class="_ _0"></span>ated use of<span class="_ _0"></span> the unique per<span class="_ _0"></span>sonal </div><div class="t m0 xb h8 y3b ff1 fs3 fc0 sc0 ls20 ws3c">features to est<span class="_ _0"></span>ablish the iden<span class="_ _0"></span>tity of a person. It is<span class="_ _0"></span> a tool for </div><div class="t m0 xb h8 y3c ff1 fs3 fc0 sc0 ls23 ws3d">positiv<span class="_ _1"></span>e identifi<span class="_ _1"></span>cation of<span class="_ _1"></span> a human subjec<span class="_ _1"></span>t as bio<span class="_ _1"></span>metric </div><div class="t m0 xb h8 y3d ff1 fs3 fc0 sc0 ls4 ws3e">signatures cannot <span class="_ _0"></span>be stolen, for<span class="_ _0"></span>gotten, lost or comm<span class="_ _0"></span>unicated </div><div class="t m0 xb h8 y3e ff1 fs3 fc0 sc0 ls22 ws3f">to another, as is p<span class="_ _0"></span>ossible in the case<span class="_ _0"></span> of authent<span class="_ _0"></span>ication </div><div class="t m0 xb h8 y3f ff1 fs3 fc0 sc0 ls1a ws39">employing cards, keys or pa<span class="_ _0"></span>sswords, so common in day-to-</div><div class="t m0 xb h8 y40 ff1 fs3 fc0 sc0 ls28 ws40">day use. In the pre<span class="_ _0"></span>sent scenario of increase<span class="_ _0"></span>d security concern, </div><div class="t m0 xb h8 y41 ff1 fs3 fc0 sc0 ls29 ws41">the necessity and rele<span class="_ _0"></span>vance of making use of biome<span class="_ _0"></span>trics to </div><div class="t m0 xb h8 y42 ff1 fs3 fc0 sc0 ls2a ws42">establish persona<span class="_ _0"></span>l identity and to detect impostors a<span class="_ _0"></span>re </div><div class="t m0 xb h8 y43 ff1 fs3 fc0 sc0 ls1c ws43">assuming significanc<span class="_ _0"></span>e. Biometric tec<span class="_ _0"></span>hniques are based on </div><div class="t m0 xb h8 y44 ff1 fs3 fc0 sc0 lsc ws44">either physiological char<span class="lsa ws45">acteristics (like finger print, i<span class="_ _1"></span>ris, etc.) </span></div><div class="t m0 xb h8 y45 ff1 fs3 fc0 sc0 ls29 ws46">or behavioral traits (li<span class="_ _0"></span>ke voice dynamics, gait, etc.). </div><div class="t m0 xd h8 y46 ff1 fs3 fc0 sc0 ls29 ws47">Depending upo<span class="_ _0"></span>n the suitability <span class="_ _0"></span>in a particular </div><div class="t m0 xb h8 y47 ff1 fs3 fc0 sc0 ls1c ws48">application, one ha<span class="_ _0"></span>s to choose a<span class="_ _0"></span> particular <span class="_ _0"></span>biometric [15]<span class="_ _0"></span> to </div><div class="t m0 xb h8 y48 ff1 fs3 fc0 sc0 ls5 ws49">be used as the<span class="_ _0"></span> basic signatur<span class="_ _0"></span>e for recogniti<span class="_ _0"></span>on. We selected </div><div class="t m0 xb h8 y49 ff1 fs3 fc0 sc0 ls15 ws4a">the face base<span class="_ _0"></span>d approach on the<span class="_ _0"></span> considerati<span class="_ _0"></span>ons that facia<span class="_ _0"></span>l </div><div class="t m0 xb h8 y4a ff1 fs3 fc0 sc0 ls2b ws4b">imaging, bein<span class="_ _0"></span>g non-intrusive<span class="_ _0"></span>, has easy client ac<span class="_ _0"></span>ceptance, </div><div class="t m0 xb h8 y4b ff1 fs3 fc0 sc0 ls2c ws4c">apart fro<span class="_ _1"></span>m the fact<span class="_ _1"></span> that fac<span class="_ _1"></span>e recogni<span class="_ _1"></span>tion is th<span class="_ _1"></span>e most natural<span class="_ _1"></span> </div><div class="t m0 xb h8 y4c ff1 fs3 fc0 sc0 ls1a ws4d">means of biometric identif<span class="_ _0"></span>ication for human beings. The </div><div class="t m0 xb h8 y4d ff1 fs3 fc0 sc0 ls2d ws4e">present circumstances around us demand increased<span class="_ _1"></span> level of </div><div class="t m0 xb h8 y4e ff1 fs3 fc0 sc0 ls5 ws4f">security and, theref<span class="_ _0"></span>ore, machine capa<span class="_ _0"></span>bility of persona<span class="_ _0"></span>l </div><div class="t m0 xb h8 y4f ff1 fs3 fc0 sc0 ls23 ws50">identifi<span class="_ _1"></span>cation from t<span class="_ _1"></span>he faci<span class="_ _1"></span>al image is c<span class="_ _1"></span>onsidered<span class="_ _1"></span> invaluabl<span class="_ _1"></span>e. </div><div class="t m0 xb h8 y50 ff1 fs3 fc0 sc0 ls28 ws51">Face-based biometric syste<span class="_ _0"></span>ms have the potentia<span class="_ _0"></span>l to fulfill the </div><div class="t m0 xb h8 y51 ff1 fs3 fc0 sc0 ls12 ws52">requirements for <span class="_ _0"></span>access control of secure<span class="_ _0"></span>d areas, surve<span class="_ _0"></span>illance, </div><div class="t m0 xb h8 y52 ff1 fs3 fc0 sc0 ls12 ws53">social welfare, law e<span class="_ _0"></span>nforcement, etc.<span class="_ _0"></span> Although there are a </div><div class="t m0 xb h8 y53 ff1 fs3 fc0 sc0 ls1c ws1e">few commercial face<span class="_ _0"></span> recognition s<span class="_ _0"></span>ystems availa<span class="_ _0"></span>ble around </div><div class="t m0 xb h8 y54 ff1 fs3 fc0 sc0 ls14 ws54">the globe, their perform<span class="_ _0"></span>ance is not up to the mark under the </div><div class="t m0 xb h8 y55 ff1 fs3 fc0 sc0 lsb ws55">practical variabilities [5]. This encouraged us to ta<span class="_ _0"></span>ke up face </div><div class="t m0 xb h8 y56 ff1 fs3 fc0 sc0 ls1c ws56">recognition system deve<span class="_ _0"></span>lopment. </div><div class="t m0 xd h8 y57 ff1 fs3 fc0 sc0 ls1c ws57">For enhanci<span class="_ _0"></span>ng the accuracy of <span class="_ _0"></span>biometric system<span class="_ _0"></span>s, </div><div class="t m0 xb h8 y58 ff1 fs3 fc0 sc0 ls14 ws58">multi-biometric technique wit<span class="_ _0"></span>h the ability to utilise either </div><div class="t m0 xb h8 y59 ff1 fs3 fc0 sc0 ls2b ws59">multiple biom<span class="_ _0"></span>etric modalit<span class="_ _0"></span>ies or multiple i<span class="_ _0"></span>nstances wi<span class="_ _0"></span>thin a </div><div class="t m0 xb h8 y5a ff1 fs3 fc0 sc0 ls14 ws5a">modality and/or<span class="_ _0"></span> multiple algorithms, prior to making a </div><div class="t m0 xb h8 y5b ff1 fs3 fc0 sc0 ls19 ws5b">specific verificati<span class="ls11 ws5c">on/identification d<span class="ls2e ws5d">ecisi<span class="_ _1"></span>on, has been </span></span></div><div class="t m0 xb h8 y5c ff1 fs3 fc0 sc0 ls9 ws5e">suggested [16]. We have de<span class="_ _0"></span>veloped a prototype fa<span class="_ _0"></span>ce </div><div class="t m0 xb h8 y5d ff1 fs3 fc0 sc0 ls1c ws5f">recognition system<span class="_ _0"></span> utilising mul<span class="_ _0"></span>ti-algorithmic m<span class="_ _0"></span>ulti-</div><div class="t m0 xb h8 y5e ff1 fs3 fc0 sc0 ls2f ws60">biomet<span class="_ _1"></span>ric te<span class="_ _1"></span>chnique t<span class="_ _1"></span>o boost th<span class="_ _1"></span>e syst<span class="_ _1"></span>em performanc<span class="_ _1"></span>e. It i<span class="_ _1"></span>s </div><div class="t m0 xb h8 y5f ff1 fs3 fc0 sc0 ls1c ws61">based on combining Correlation with Principal Com<span class="_ _0"></span>ponent </div><div class="t m0 xb h8 y60 ff1 fs3 fc0 sc0 ls1a ws62">Analysis (PCA) or Discr<span class="_ _0"></span>ete Cosine Transform (DCT) </div><div class="t m0 xb h8 y61 ff1 fs3 fc0 sc0 ls1a ws63">technique for the purpose of deciding a facial match. </div><div class="t m0 xe h9 y62 ff4 fs5 fc0 sc0 ls2 ws2">1-4244-0716-8/06/$20.00 &#169;2006 IEEE.<span class="_ _6"> </span>321</div><div class="t m0 xf ha y63 ff5 fs6 fc0 sc0 ls2 ws2"><span class="fc1 sc0">Authorized licensed use limited to: Harbin University of Science and Technology. Downloaded on April 01,2010 at 22:49:46 EDT from IEEE Xplore. Restrictions apply. </span></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div> </body> </html>
评论
    相关推荐
    • pca.rar
      基于PCA和神经网络的人脸识别方法研究方面的资料,希望对你们有帮助
    • dicbelevel.zip
      人工智能的经典资料,PCA和RobustPCA等算法,可用于数据降维
    • dct.zip
      dct code for compression
    • 离散余弦变换DCT)应用方面的论文
      基于DCTPCA及神经网络的人脸识别研究.pdf 基于DCT的人脸特征提取.pdf 基于DCT的图像压缩及其MATLAB实现.pdf 基于DCT频域数字图像水印算法研究.pdf 基于MATLAB的DCT变换在JPEG图像压缩中的应用.pdf 基于MATLAB的DCT...
    • pca-sift.rar
      具有含有最近年的改进sift研究文献,有便于深入了解局部特征研究领域
    • PCA+2DPCA+DCT
      Matlab程序,利用了PCA和2DPCA,中间还用了DCT进行处理,使得程序运行速度加快
    • DCT feature extract.rar
      DCT特征,人脸识别,光照变化,C++代码,论文
    • PCA人脸表情识别.zip
      PCA人脸表情识别全部代码及其资料,可以运行
    • pca,ica,lda,svm-1.rar
      PCA, LDA and SVM publication on face recognition
    • matlabcnhelp.rar
      matlab中文帮助很难找的,快速下载