論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available
論文名稱 Title |
雷射光斑與訊號辨識技術之研究 Research on Identification of Laser Speckles and Signals |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
69 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2010-07-06 |
繳交日期 Date of Submission |
2010-09-07 |
關鍵字 Keywords |
生物辨識、雷射光斑、辨識系統 Gabor wavelets, adaboost, SIFT, biometric, identification system, laser speckle |
||
統計 Statistics |
本論文已被瀏覽 5630 次,被下載 0 次 The thesis/dissertation has been browsed 5630 times, has been downloaded 0 times. |
中文摘要 |
隨著科技的進步,電子e 化時代已經來臨,為了達到個人隱私與商業行為安全, 無時無刻都需要做到身份辨識,例如登入個人信箱、證卷交易的網路電子下單、 網路拍賣等。傳統的辨識方法難以確保其安全性,常因為單純的密碼外流,使身 份遭到盜用或資料被入侵。近年來已經漸漸的朝向生物特徵辨識系統發展,利用 生物獨一無二的特徵,來辨識使用者的身份。在本篇論文中,我們提出兩個以雷 射為基礎的新辨識系統,第一個為雷射光斑影像辨識系統,利用雷射光束掃描器 對所需辨識物件進行掃描,基於每個物件的表層在微觀下具有非常複雜與不規則 之特性,因此造成雷射掃描時會產生複雜的散射及繞射,形成所謂的雷射光斑 (Laser Speckle),在掃描過程中,偵測這些光斑並形成物件的影像,並將這些影 像儲存於資料庫內,使其可以應用在生活上各種不同的地方。第二個為一維手指 訊號生物辨識系統,利用雷射讀取頭掃描手指的表面,形成光斑訊號並且記錄其 特徵,透過訊號的分析及資料庫的建立來完成手指訊號的辨識。最後則透過模擬 實際應用的情境來進行實驗,實驗結果顯示皆達到100%。 |
Abstract |
With an increasing emphasis on personal privacy, security, and convenience, the security of identification system is an important issue nowadays. In this thesis, two intelligent identification systems, laser speckle image identification system and laser-based finger biometric system, are proposed to perform superior solutions for identification applications. In laser speckle image identification system, we investigated the characteristics of laser speckle as well as proposed an appropriate algorithm to establish this system. The proposed algorithm is a coarse-to-fine process which identifies laser speckle images systematically. In laser-based finger biometric system, a new biometric approach is described to proceed personal identification using a scanner with a low power laser scans across the surface of the finger and continuously recording the reflected intensity at a fixed position. Experimental results show that the recognition rates of the proposed system are both 100%. |
目次 Table of Contents |
中文摘要 .......................................................................................................................... i Abstract ......................................................................................................................... ii Contents ........................................................................................................................ iii List of Figures ........................................................................................................................ iv List of Tables ......................................................................................................................... v Chapter 1 Introduction ............................................................................................................... 1 1.1 Overview of Identification System .......................................................................... 1 1.2 Overview of Biometric System................................................................................ 3 1.3 Motivation ............................................................................................................. 10 1.4 Contribution ........................................................................................................... 12 1.5 Organization .......................................................................................................... 14 Chapter 2 Background Review ................................................................................................ 15 2.1 Overview of Laser Speckle Identification System ................................................. 15 2.2 Scale Invariant Feature Transform ........................................................................ 18 2.3 Adaboost .............................................................................................................. 20 Chapter 3 Laser Speckle Metrology and Its Identification ...................................................... 26 3.1 Overview of Laser Speckle Identification System ................................................. 26 3.2 Database of Laser Speckle identification System .................................................. 30 3.3 Identification module of Laser Speckle identification System .............................. 36 Chapter 4 Identification and Analysis of 1-D Laser Finger Signal ......................................... 38 4.1 Overview ............................................................................................................... 38 4.2 System Algorithm .................................................................................................. 41 Chapter 5 Experimental Results .............................................................................................. 47 5.1 Laser Speckle Image Identification ....................................................................... 48 5.2 1-D laser Signal Analysis ...................................................................................... 53 Chapter 6 Conclusions and Future Work ................................................................................. 55 Reference ....................................................................................................................... 58 |
參考文獻 References |
[1] A. Jain, L. Hong, and S. Pankati, “Biometric identification,” Communications of the ACM, vol. 43, no. 2, pp. 90-98, 2000. [2] A. Jain, L. Hong, S. Pankati, and R. Bolle, “An identity authentication system using fingerprints,” in Proceedings of the IEEE 85, vol. 9, pp. 1365-1388, 1997. [3] B. Miller, “Vital signs of identity,” IEEE Spectrum 31, vol. 2, pp. 22–30, 1994. [4] A. Jain, R. Bolle and S. Pankati, “Biometrics: Personal identification in networked society,” Kluwer, New York, 1999. [5] R. Clarke, “Human identification in information systems: management challenges and public policy issues,” Information Technology & People, vol. 7, no. 4, pp. 6-37, 1994. [6] A. Jain and L. Hong, “On-line fingerprint verification,” in Proceedings of 13th ICPR, pp. 596-600, 1996. [7] J.G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Transactions on Pattern Anal. and Machine Intell. 15, pp. 1148–1161, 1993. [8] R. Chellappa, C. Wilson and A. Sirohey, “Human and machine recognition of faces: A survey,” in Proceedings of the IEEE 83, pp. 705–740, 1995. [9] J. D. R. Buchanan, R. P. Cowburn, A. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D. A. Allwood and M. T. Bryan, “Forgery: fingerprinting, documents and packaging” Nature, pp. 436-475. [10] E. Sarma Sanjay, A. Weis Stephen and W. Engels Daniel, “RFID systems and security and privacy implications,” in Workshop on Cryptographic Hardware and Embedded Systems lecture notes in computer science, pp. 454–470, 2002. [11] A. Juels, “RFID security and privacy: A research survey,” in Proceedings of IEEE JSAC, 2006. [12] M. Shridhar, J.W.V. Miller, G. Houle and L. Bijnagte, “Recognition of license plate images: issues and perspectives”, in Proceedings of the Fifth International Conference on Document Analysis and Recognition, pp. 17-20, September 1999. [13] P. Viola and M.Jones, “Robust real-time object detection,” IEEE International Journal of Computer Vision, vol.57, no.2, pp.137-154, May 2004. [14] J. Daugman: “Complete discrete 2-D gabor transforms by neural networks for image analysis and compression,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 36. no. 7, pp. 1169–1179, July 1988. [15] L. I. Smith, “A tutorial on principal components analysis”, 2002. [16] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line learning and an application to boosting,” Journal of Computer and System Sciences, vol. 55, August 1997. [17] D. G. Lowe. “Distinctive image features from scale-invariant keypoints,” International journal of computer vision, pp. 60, 2004. [18] M. Lades, J. Vorbruggen, J. Buhmann, J. Lange, C. von der Malsburg, W. R.P., and W. Konen. “Distortion invariant object recognition in the dynamic link architecture,” IEEE Transactions on Computers, vol. 42, pp.300-311, 1993. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:校內校外均不公開 not available 開放時間 Available: 校內 Campus:永不公開 not available 校外 Off-campus:永不公開 not available 您的 IP(校外) 位址是 35.172.193.238 論文開放下載的時間是 校外不公開 Your IP address is 35.172.193.238 This thesis will be available to you on Indicate off-campus access is not available. |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |