Responsive image
博碩士論文 etd-0907110-032700 詳細資訊
Title page for etd-0907110-032700
論文名稱
Title
雷射光斑與訊號辨識技術之研究
Research on Identification of Laser Speckles and Signals
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
69
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2010-07-06
繳交日期
Date of Submission
2010-09-07
關鍵字
Keywords
生物辨識、雷射光斑、辨識系統
Gabor wavelets, adaboost, SIFT, biometric, identification system, laser speckle
統計
Statistics
本論文已被瀏覽 5630 次,被下載 0
The thesis/dissertation has been browsed 5630 times, has been downloaded 0 times.
中文摘要
隨著科技的進步,電子e 化時代已經來臨,為了達到個人隱私與商業行為安全,
無時無刻都需要做到身份辨識,例如登入個人信箱、證卷交易的網路電子下單、
網路拍賣等。傳統的辨識方法難以確保其安全性,常因為單純的密碼外流,使身
份遭到盜用或資料被入侵。近年來已經漸漸的朝向生物特徵辨識系統發展,利用
生物獨一無二的特徵,來辨識使用者的身份。在本篇論文中,我們提出兩個以雷
射為基礎的新辨識系統,第一個為雷射光斑影像辨識系統,利用雷射光束掃描器
對所需辨識物件進行掃描,基於每個物件的表層在微觀下具有非常複雜與不規則
之特性,因此造成雷射掃描時會產生複雜的散射及繞射,形成所謂的雷射光斑
(Laser Speckle),在掃描過程中,偵測這些光斑並形成物件的影像,並將這些影
像儲存於資料庫內,使其可以應用在生活上各種不同的地方。第二個為一維手指
訊號生物辨識系統,利用雷射讀取頭掃描手指的表面,形成光斑訊號並且記錄其
特徵,透過訊號的分析及資料庫的建立來完成手指訊號的辨識。最後則透過模擬
實際應用的情境來進行實驗,實驗結果顯示皆達到100%。
Abstract
With an increasing emphasis on personal privacy, security, and convenience, the
security of identification system is an important issue nowadays. In this thesis, two
intelligent identification systems, laser speckle image identification system and
laser-based finger biometric system, are proposed to perform superior solutions for
identification applications. In laser speckle image identification system, we
investigated the characteristics of laser speckle as well as proposed an appropriate
algorithm to establish this system. The proposed algorithm is a coarse-to-fine process
which identifies laser speckle images systematically. In laser-based finger biometric
system, a new biometric approach is described to proceed personal identification
using a scanner with a low power laser scans across the surface of the finger and
continuously recording the reflected intensity at a fixed position. Experimental results
show that the recognition rates of the proposed system are both 100%.
目次 Table of Contents
中文摘要 .......................................................................................................................... i
Abstract ......................................................................................................................... ii
Contents ........................................................................................................................ iii
List of Figures ........................................................................................................................ iv
List of Tables ......................................................................................................................... v
Chapter 1 Introduction ............................................................................................................... 1
1.1 Overview of Identification System .......................................................................... 1
1.2 Overview of Biometric System................................................................................ 3
1.3 Motivation ............................................................................................................. 10
1.4 Contribution ........................................................................................................... 12
1.5 Organization .......................................................................................................... 14
Chapter 2 Background Review ................................................................................................ 15
2.1 Overview of Laser Speckle Identification System ................................................. 15
2.2 Scale Invariant Feature Transform ........................................................................ 18
2.3 Adaboost .............................................................................................................. 20
Chapter 3 Laser Speckle Metrology and Its Identification ...................................................... 26
3.1 Overview of Laser Speckle Identification System ................................................. 26
3.2 Database of Laser Speckle identification System .................................................. 30
3.3 Identification module of Laser Speckle identification System .............................. 36
Chapter 4 Identification and Analysis of 1-D Laser Finger Signal ......................................... 38
4.1 Overview ............................................................................................................... 38
4.2 System Algorithm .................................................................................................. 41
Chapter 5 Experimental Results .............................................................................................. 47
5.1 Laser Speckle Image Identification ....................................................................... 48
5.2 1-D laser Signal Analysis ...................................................................................... 53
Chapter 6 Conclusions and Future Work ................................................................................. 55
Reference ....................................................................................................................... 58
參考文獻 References
[1] A. Jain, L. Hong, and S. Pankati, “Biometric identification,” Communications
of the ACM, vol. 43, no. 2, pp. 90-98, 2000.
[2] A. Jain, L. Hong, S. Pankati, and R. Bolle, “An identity authentication system
using fingerprints,” in Proceedings of the IEEE 85, vol. 9, pp. 1365-1388,
1997.
[3] B. Miller, “Vital signs of identity,” IEEE Spectrum 31, vol. 2, pp. 22–30, 1994.
[4] A. Jain, R. Bolle and S. Pankati, “Biometrics: Personal identification in
networked society,” Kluwer, New York, 1999.
[5] R. Clarke, “Human identification in information systems: management challenges and
public policy issues,” Information Technology & People, vol. 7, no. 4, pp. 6-37, 1994.
[6] A. Jain and L. Hong, “On-line fingerprint verification,” in Proceedings of 13th ICPR,
pp. 596-600, 1996.
[7] J.G. Daugman, “High confidence visual recognition of persons by a test of statistical
independence,” IEEE Transactions on Pattern Anal. and Machine Intell. 15, pp.
1148–1161, 1993.
[8] R. Chellappa, C. Wilson and A. Sirohey, “Human and machine recognition of
faces: A survey,” in Proceedings of the IEEE 83, pp. 705–740, 1995.
[9] J. D. R. Buchanan, R. P. Cowburn, A. Jausovec, D. Petit, P. Seem, G. Xiong, D.
Atkinson, K. Fenton, D. A. Allwood and M. T. Bryan, “Forgery:
fingerprinting, documents and packaging” Nature, pp. 436-475.
[10] E. Sarma Sanjay, A. Weis Stephen and W. Engels Daniel, “RFID systems and
security and privacy implications,” in Workshop on Cryptographic Hardware
and Embedded Systems lecture notes in computer science, pp. 454–470, 2002.
[11] A. Juels, “RFID security and privacy: A research survey,” in Proceedings of
IEEE JSAC, 2006.
[12] M. Shridhar, J.W.V. Miller, G. Houle and L. Bijnagte, “Recognition of license
plate images: issues and perspectives”, in Proceedings of the Fifth
International Conference on Document Analysis and Recognition, pp. 17-20,
September 1999.
[13] P. Viola and M.Jones, “Robust real-time object detection,” IEEE International
Journal of Computer Vision, vol.57, no.2, pp.137-154, May 2004.
[14] J. Daugman: “Complete discrete 2-D gabor transforms by neural networks for
image analysis and compression,” IEEE Transactions on Acoustics, Speech,
and Signal Processing, vol. 36. no. 7, pp. 1169–1179, July 1988.
[15] L. I. Smith, “A tutorial on principal components analysis”, 2002.
[16] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line
learning and an application to boosting,” Journal of Computer and System
Sciences, vol. 55, August 1997.
[17] D. G. Lowe. “Distinctive image features from scale-invariant keypoints,”
International journal of computer vision, pp. 60, 2004.
[18] M. Lades, J. Vorbruggen, J. Buhmann, J. Lange, C. von der Malsburg, W. R.P.,
and W. Konen. “Distortion invariant object recognition in the dynamic link
architecture,” IEEE Transactions on Computers, vol. 42, pp.300-311, 1993.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 35.172.193.238
論文開放下載的時間是 校外不公開

Your IP address is 35.172.193.238
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code