Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/68073
Title: 以機器學習為基礎的加密臉部辨識方法及其在數位監控上之應用
A Machine Learning Based Secure Face Verification Scheme and Its Applications to Digital Surveillance
Authors: Huan-Chih Wang
王煥智
Advisor: 吳家麟
Keyword: 臉部辨識,機器學習,類神經網路,同態加密,安全,數位監控,
Facial Verification,Machine Learning,Convolutional Neural Network,Homomorphic Encryption,Security,Digital Surveillance,
Publication Year : 2017
Degree: 碩士
Abstract: 臉部辨識是廣為人知的影像識別應用,並且在當代社會很常被應用來做身份的辨別。然而,許多系統卻忽視了保護臉部影像的重要性。若是臉部的影像未被保護起來,惡意人士便能竊取、複製影像,並偽裝成為其他人。為了解決這個問題,我們設計了一個能同時保護臉部影像的臉部辨識的系統。我們使用 DeepID2 卷積類神經網路來提取臉部特徵、使用最大期望演算法來來協助進行臉部辨識。為了確保臉部影像的安全,我們使用同態加密來將臉部特徵加密起來,使最大期望演算法能在密文域中做計算。基於不同的安全性考量,我們針對社區設計了三套不同的門禁系統,並在最後對三個系統做辨識準確率與執行速度等實驗,比較各優缺點。
Face Verification is a well known image analysis application and wildly used for recognizing individuals in contemporary society. However, in real applications, some of recognition systems ignore the importance of protecting the facial images that are used for verification. If the facial images are not protected, malicious people can steal and copy the images to disguise as someone else. To conquer this problem, we design a secure face verification system that can also protect the facial images to be imitated. In our work, we use the DeepID2 convolutional neural network to extract the feature of a facial image and use the EM algorithm to do the facial verification problem. In order to keep the facial images privacy, we use the homomorphic encryption scheme to encrypt the facial data and compute the EM algorithm in the ciphertext domain. Based on difference privacy concerns, we build up three face recognition systems for surveillance or entry and exist control of a local community. Lastly, we conduct experiments of accuracy and time consuming and compare pros can cons between these systems.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/68073
DOI: 10.6342/NTU201701863
Fulltext Rights: 有償授權
Appears in Collections:資訊工程學系

Files in This Item:
File SizeFormat 
ntu-106-1.pdf
  Restricted Access
1.53 MBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved