[1]胡成. 基于人脸识别技术的地铁公安视频监控系统方案研究[J]. 现代城市轨道交通, 2023 (8): 2025[2]郑孟望. 智能监控技术应用对治安防控的挑战及其应对[J]. 长江信息通信, 2021, 34(10): 132134[3]Cheon J H, Kim A, Kim M, et al. Homomorphic encryption for arithmetic of approximate numbers[C] Proc of Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2017: 409437[4]Shlens J. A tutorial on principal component analysis[J]. arXiv preprint, arXiv:1404.1100, 2014[5]Yang A, Yang X, Wu W, et al. Research on feature extraction of tumor image based on convolutional neural network[J]. IEEE Access, 2019, 7: 2420424213[6]Zhang Z, Li F, Zhao M, et al. Robust neighborhood preserving projection by nuclearl2, 1norm regularization for image feature extraction[J]. IEEE Trans on Image Processing, 2017, 26(4): 16071622[7]Yuan H, Li J, Lai L L, et al. Lowrank matrix regression for image feature extraction and feature selection[J]. Information Sciences, 2020, 522: 214226[8]Schroff F, Kalenichenko D, Philbin J. FaceNet: A unified embedding for face recognition and clustering[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2015: 815823[9]Huang G B, Ramesh M, Berg T, et al. Labeled faces in the wild: A database for studying face recognition in unconstrained environments, Tech Rep: 0749[R]. Amherst, USA: University of Massachusetts, 2007[10]Sun Y, Wang X, Tang X. Deep learning face representation from predicting 10000 classes[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2014: 18911898[11]Deng J, Guo J, Xue N, et al. Arcface: Additive angular margin loss for deep face recognition[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2019: 46904699[12]KemelmacherShlizerman I, Seitz S M, Miller D, et al. The megaface benchmark: 1 million faces for recognition at scale[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2016: 48734882[13]Serengil S I, Ozpinar A. Hyper extended Lightface: A facial attribute analysis framework[C] Proc of the 2021 Int Conf on Engineering and Emerging Technologies (ICEET). Piscataway, NJ: IEEE, 2021: 14[14]徐慧华, 杨雄, 张晓惠. 云计算环境下基于全同态加密的人脸信息保护[J]. 贵州大学学报: 自然科学版, 2021, 38(3): 8391[15]Xu Z, Shao Z, Shang Y, et al. Fusing structure and color features for cancelable face recognition[J]. Multimedia Tools and Applications, 2021, 80: 1447714494[16]Antonijevic M, Strumberger I, Lazarevic S, et al. Robust encrypted face recognition robot based on bit slicing and Fourier transform for cloud environments[J]. Journal of Electronic Imaging, 2022, 31(6): 061808[17]吴俊青, 彭长根, 谭伟杰, 等. FaceEncAuth:基于FaceNet和国密算法的人脸识别隐私安全方案[J]. 计算机工程与应用, 2022, 58(11): 9399[18]苏昀暄, 涂正, 王绪安, 等. 一种基于CKKS同态加密与神经网络的安全人脸识别方案[J]. 兰州理工大学学报, 2023, 49(2): 103109[19]李雅硕, 龙春, 魏金侠, 等. 基于同态加密的人脸识别隐私保护方法[J]. 信息安全研究, 2023, 9(9): 843850[20]Danielsson P E. Euclidean distance mapping[J]. Computer Graphics and Image Processing, 1980, 14(3): 227248[21]Yang S, Luo P, Chen C L, et al. WIDER FACE: A face detection benchmark[EBOL]. [20240114]. http:shuoyang1213.meWIDERFACE 2017,331
|