全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Implementation of Robot Platform in Face Detection and Tracking Based on a New Authentication Scheme

DOI: 10.1155/2014/839753

Full-Text   Cite this paper   Add to My Lib

Abstract:

This study proposes a method for using stereo vision and face recogonition. The method differs from the feedback detection method used in sensors in general. The method disregards unimportant environmental changes and improves the overall performance of the recognition and tracking functions. Dual-CCD cameras on the visual system are used to capture images of faces. Through image preprocessing, determination of the moving target, and the position of the target center, the image is matched with the sample image to allow the robot to recognize and track stereo objects visually. The robot can recognize and track faces. And, the system also sends the images to a remote computer by wireless. A scheme is proposed to enhance the authentication messages by hash function in wireless communications. Since the proposed scheme provides an encryption function, it improves the authentication for wireless communications. 1. Introduction The information technology industry has vigorously developed, and computer vision has increased in importance. The advancement of computer technology has directed increasing attention to CPU and DSP. In addition, the annual decline in hardware cost has significantly reduced the computation time and cost of image processing and has thus increased the practicality of computer vision systems and their applications. Although such systems have greatly improved in terms of the theory, algorithms, and practical applications of image processing, core technologies of computer vision still require breakthroughs and innovation. For instance, if a leaf falls on a moving car, computer vision should not mistake the leaf as an obstacle and put the car on break or turn it around [1–5]. Controlling data transmission in a wireless environment and to prevent illegal access to resources, users must be authorized [6]. Privacy is an important subject in wireless communications. Users require protection from identifying theft or being caught in some way. Thus, the anonymous technology is a solution to solve the problems of user’s identification that could be stolen by attackers. The features of chaos systems include their dynamic response and high sensitivity to variations in the initial values of a system, such as nonperiodicity, nonconvergence, and control parameters. Many methodologies and profound mathematical theories about chaos systems have been proposed in applications such as image encryption [7–9], secure communications [10, 11], and image processing [12, 13] in the past 20 years. Huang et al. [7] proposed a scheme for implementing quasioptimal

References

[1]  A. D. Kulkami, Computer Vision and Fuzzy-Fuzzy-Neural Systems, Prentice Hall, 2001.
[2]  D. Marr and T. Poggio, “Cooperative computation of stereo disparity,” Science, vol. 194, no. 4262, pp. 283–287, 1976.
[3]  S. T. Barnard and W. B. Thompson, “Disparity analysis of images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 2, no. 4, pp. 333–340, 1980.
[4]  J. S. Lee, C. W. Seo, and E. S. Kim, “Implementation of opto-digital stereo object tracking system,” Optics Communications, vol. 200, no. 1–6, pp. 73–85, 2001.
[5]  C. C. Chiang, W. K. Tai, M. T. Yang, Y. T. Huang, and C. J. Huang, “A novel method for detecting lips, eyes and faces in real time,” Real-Time Imaging, vol. 9, no. 4, pp. 277–287, 2003.
[6]  J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004.
[7]  C. K. Huang, H. H. Nien, S. K. Changchien, and H. W. Shieh, “Image encryption with chaotic random codes by grey relational grade and Taguchi method,” Optics Communications, vol. 280, no. 2, pp. 300–310, 2007.
[8]  N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006.
[9]  G. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, pp. 347–354, 2010.
[10]  Z. Li, K. Li, C. Wen, and Y. C. Soh, “A new chaotic secure communication system,” IEEE Transactions on Communications, vol. 51, no. 8, pp. 1306–1312, 2003.
[11]  W. D. Chang, “Digital secure communication via chaotic systems,” Digital Signal Processing, vol. 19, no. 4, pp. 693–699, 2009.
[12]  E. Swiercz, “A new method of detection of coded signals in additive chaos on the example of Barker code,” Signal Processing, vol. 86, no. 1, pp. 153–170, 2006.
[13]  H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen, and Y. Y. Tuan, “Digital color image encoding and decoding using a novel chaotic random generator,” Chaos, Solitons and Fractals, vol. 32, no. 3, pp. 1070–1080, 2007.
[14]  L. Ding and A. M. Martinez, “Features versus context: an approach for precise and detailed detection and delineation of faces and facial features,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 11, pp. 2022–2038, 2010.
[15]  C. Garcia and G. Tziritas, “Face detection using quantized skin color regions merging and wavelet packet analysis,” IEEE Transactions on Multimedia, vol. 1, no. 3, pp. 264–277, 1999.
[16]  R.-L. Hsu, M. Abdel-Mottaleb, and A. K. Jain, “Face detection in color images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 5, pp. 696–706, 2002.
[17]  C. Lin and K. C. Fan, “Human face detection using geometric triangle relationship,” in Proceedings of IEEE 15th International Conference on Pattern Recognition, vol. 2, pp. 941–944, 2000.
[18]  W. Y. Yau and H. Wang, “Fast relative depth computation for an active stereo vision system,” Real-Time Imaging, vol. 5, no. 3, pp. 189–202, 1999.
[19]  J.-H. Han, S. Yang, and B. U. Lee, “A novel 3-D color histogram equalization method with uniform 1-D gray scale histogram,” IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 506–512, 2011.
[20]  J. Ilonen, J. K. Kamarainen, P. Paalanen, M. Hamouz, J. Kittler, and H. K?lvi?inen, “Image feature localization by multiple hypothesis testing of Gabor features,” IEEE Transactions on Image Processing, vol. 17, no. 3, pp. 311–325, 2008.
[21]  A. Khanam and M. Mufti, “Intelligent expression blending for performance driven facial animation,” IEEE Transactions on Consumer Electronics, vol. 53, no. 2, pp. 578–584, 2007.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133