Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication
AbstractIdentity authentication is one of the most basic components in the computer network world. It is the key technology of information security. It plays an important role in the protection of system and data security. Biometric recognition technology provides a reliable and convenient way for identity authentication. Compared with other biometric recognition technologies, face recognition has become a hot research topic because of its convenience, friendliness and easy acceptance. With the maturity and progress of face recognition technology, its commercial application has become more and more widespread. Internet finance, e-commerce and other asset-related areas have begun to try to use face recognition technology as a means of authentication, so people’s security needs for face recognition systems are also increasing. However, as a biometric recognition system, face recognition system still has inherent security vulnerabilities and faces security threats such as template attack and counterfeit attack. In view of this, this paper studies the application of threedimensional face recognition algorithm in the field of financial identity authentication. On the basis of feature extraction of face information using neural network algorithm, K-L transform is applied to image high-dimensional vector mapping to make face recognition clearer. Thus, the image loss can be reduced.
 Rila, L.; Mitchell, C. J. (2003). Security protocols for biometrics-based cardholder authentication in smartcards, International Conference on Applied Cryptography and Network Security,Springer, 254-264,2003.
 Nair, S.K.; Dashti, M.T.; Crispo, B.; et al. (2007). A hybrid PKI-IBC based ephemerizer system, IFIP International Information Security Conference,Springer, 241-252,2007.
 Shi, J.P. (2016). Research on fingerprint watermarking algorithm for copyright protection and identity authentication, Nanjing University of Aeronautics and Astronautics, 2016.
 Li, Y.; Wang, Y.H.; Liu, J. (2011). 3D Face Recognition Based on Ridge Valley Feature Extraction, Computer Engineering and Applications, 47 (12), 7-112, 2011.
 As'Ari, M.A.; Sheikh, U.U.; Supriyanto, E. (2014). 3D shape descriptor for object recognition based on Kinect-like depth image, Image & Vision Computing, 32(4), 260-269, 2014.
 Zhan, S.; Zhang, Q.X.; Jiang, J.G. (2013). Three-dimensional face recognition based on Gabor feature kernels cooperative expression, Journal of Photonics, 42 (12), 1448-1453, 2013.
 Daniyal, F.; Nair, P.; Cavallaro, A.(2009). Compact Signatures for 3D Face Recognition under Varying Expressions, Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2-4 September 2009, Genova, Italy, 2009.
 Lu,S.W.; Da F.P.; Deng, X. (2015). Three-dimensional face recognition based on improved LBP, Journal of Southeast University: Natural Science Edition, 45 (4), 678-682, 2015.
 Karhunen,J.; Joutsensalo,J. (1994). Representation and separation of signals using nonlinear PCA type learning, Neural Networks, 7(1), 113-127, 1994.
 Moon,H.; Phillips,P.J.(2001). Computational and performance aspects of PCA-based facerecognition algorithms, Perception, 30(3), 303-21, 2001.
 Velkumar,K.; Bhavani,M.(2012). Face Recognition Using PCA and LDA Algorithm, Second International Conference on Advanced Computing & Communication Technologies, 2012. Le Thi, Hoai An and Nguyen, M. C.
 Le T.; Hoai, A.;Nguyen, M.C.(2017). DCA based algorithms for feature selection in multi-class support vector machine, Annals of Operations Research, 249(1-2), 1-28, 2017.
 Sasagawa, Y.(2014). Neural network system, Annals of Operations Research, 2014.
 Bevilacqua, V.; Cariello, L.; Carro, G.; Daleno, D.; Mastronardi, G.(2008). A face recognition system based on Pseudo 2D HMM applied to neural network coefficients, Soft Computing, 12(7), 615-621, 2008.
 Aitkenhead, M.J.; Mcdonald, A.(2003). A neural network face recognition system, Engineering Applications of Artificial Intelligence, 16(3), 167-176, 2003.
 Soltanali, S.; Halladj, R.; Tayyebi, S.; Rashidi, A.(2014). Neural network and genetic algorithm for modeling and optimization of effective parameters on synthesized ZSM-5 particle size, Materials Letters, 136(136), 138-140, 2014.
 Wilkinson, R.; El, S.; Gieseking, C.(2010). Performance and Arousal as a Function of Incentive, Information Load, and Task Novelty, Psychophysiology, 9(6), 589-599, 2010.
 Reed, I.S.; Mallett, J.D.; Brennan, L.E.(2007). Rapid Convergence Rate in Adaptive Arrays, IEEE Transactions on Aerospace & Electronic Systems, AES-10(6), 853-863, 2007.
 Soudry, D.; Di Castro, D.; Gal, A.; Kolodny, A.; Kvatinsky, S.(2017). Memristor-Based Multilayer Neural Networks With Online Gradient Descent Training, IEEE Transactions on Neural Networks & Learning Systems, 26(10), 2408-2421, 2017.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.