[1]內政部戶政司 (2018, January 28). 人口統計 [Online].Available:http://www.ris.gov.tw/
[2]內政部警政署 (2018, February 13).刑案發生統計[Online]. Available:https://www.npa.gov.tw/NPAGip/wSite/mp?mp=1
[3]蘇怡璇 (2017, December 18). 男強盜民宅 [Online].Available:http://www.setn.com/News.aspx?NewsID=326754
[4]鐘武達 (2017, June 21) 老闆行竊失風,竟毒打獨居老人 [Online].Available:http://www.chinatimes.com/newspapers/20170621000665-260107
[5]August (2016, November 06) Smart Lock [Online].Available:http://august.com
[6]ASUS (2016, June 16) Smart Door Lock [Online].Available:https://www.asus.com/tw/
[7]ZKTeco (2015, September 29) 指紋辨識門鎖 [Online].Available:http://www.zkteco.com
[8]Yale(2016, June 20) 電子鎖 YMF40 指紋鎖 密碼鎖 [Online].Available:https://www.yale.com.hk/zh-hk/yale/yale-hk/
[9]Samsung(2016, October 4)電子鎖SHP-DP728 [Online].Available:https://samsungsmarthome.cyberbiz.co/
[10]壹讀 (2016, February 03) 這樣簡單幾步就能破解指紋手機?一起來驗證 [Online].Available:https://read01.com/zh-tw/AGnAL.html#.WhrFVUqWaHs
[11]Ettoday新聞雲 (2018 January 29) 破解手機指紋辨識只需一塊「橘子皮」! [Online].Available:https://www.ettoday.net/news/20180129/1102849.htm
[12]SCG (2010, March 14) RFID感應鎖[Online].Available:http://www.scglock.com/big5
[13]卿榮波 (2015, February 09) 電子市場5秒就能複製一張 [Online].Available:http://m.news.sina.com.tw/article/20150209/13820713.html
[14]Beseye (2017, June. 14) Beseye Pro雲端智慧攝影機 [Online].Available:https://www.beseye.com/tw/home
[15]小米公司 (2015, June 25) 小蟻智慧攝影機 [Online].Available:http://www.mi.com/tw/
[16]G. Sowjanya, and S. Nagaraju, “Design and implementation of door access control and security system based on IOT” in proceedings of International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp.1-4.
[17]R. Ibrahim, and Z. M. Zin, “Study of automated face recognition system for office door access control application”, in proceedings of International Conference on Communication Software and Networks (ICCSN), Xi'an, China, 27-29 May 2011, pp.132-136
[18]M. Sahani, C. Nanda, and A. K. Sahu, “Web-based online embedded door access control and home security system based on face recognition,” in proceedings of International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 19-20 March 2015, pp. 1-6.
[19]A. B. Dorothy, S. B. R. Kumar, and J. J. Sharmila, “IoT Based Home Security through Digital Image Processing Algorithms,” in proceedings of World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, India, 2-4 Feb. 2017, pp. 20-23.
[20]L. Zhengzheng, L. Lianrong, and W. Yong, “Development of face recognition system based on PCA and LBP for intelligent anti-theft doors,” in proceedings of International Conference on Computer and Communications (ICCC), Chengdu, China, 14-17 Oct. 2016, pp. 341-346.
[21]R. Endluri, M. Kathait, and K. C. Ray, “Face recognition using PCA on FPGA based embedded platform,” in proceedings of International Conference on Control, Automation, Robotics and Embedded Systems (CARE), Jabalpur, India, 16-18 Dec. 2013, pp. 1-4.
[22]S. N. Borade, R. R. Deshmukh, and S. Ramu, “Face recognition using fusion of PCA and LDA: Borda count approach,” in proceedings of Mediterranean Conference on Control and Automation (MED), Athens, Greece, 21-24 June 2016, pp. 1164-1167.
[23]N. S. Tummala, and P. C. Sekhar, “Face recognition using PCA and geometric approach,” in proceedings of International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 18-19 July 2017, pp. 562-565.
[24]E. U. Haq, X. Huarong, and M. I. Khattak, “Face Recognition by SVM Using Local Binary Patterns,” in proceedings of Conference on Web Information Systems and Applications (WISA), Liuzhou, Guangxi Province, China, 11-12 Nov. 2017, pp. 172-175.
[25]W. Yiding, X. Wei, and Y. Xiaojie, “An automatic physical access control system based on hand vein biometric identification,” in proceedings of IEEE Transactions on Consumer Electronics, IEEE Consumer Electronics Society,15 October 2015, pp. 320-327.
[26]N. R. Borkar, and S. Kuwelkar, “Real-time implementation of face recognition system,” in proceedings of International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 18-19 July 2017, pp. 249-255.
[27]C. Zijun, S. Tianwei, and C. Wenhua, “3D face recognition based on kinect depth data,” in proceedings of International Conference on Systems and Informatics (ICSAI), Hangzhou, China, 11-13 Nov. 2017, pp. 555-559.
[28]Q. Akariman, A. N. Jati, and A. Novianty, “Face recognition based on the Android device using LBP algorithm,” in proceedings of International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, Indonesia, Indonesia, 27-29 Aug. 2015, pp. 166-170.
[29]N. A. Hussein, and I. A. Mansoori, “Smart Door System for Home Security Using Raspberry pi3,” in proceedings of International Conference on Computer and Applications (ICCA), Doha, United Arab Emirates, 6-7 Sept. 2017, pp. 395-399.
[30]B. Vaidya, A. Patel, A. Panchal, R. Mehta, K. Mehta, and P. Vaghasiya, “Smart home automation with a unique door monitoring system for old age people using Python, OpenCV, Android and Raspberry pi,” in proceedings of International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 15-16 June 2017, pp. 82-86.
[31]C. Yong-Ping, C. Qi-Hui, and C. Kuan-Yu, “Low-cost face recognition system based on extended local binary pattern, ” in proceedings of International Automatic Control Conference (CACS), Taichung, Taiwan, 9-11 Nov. 2016, pp. 13-18.
[32]黃韋瀚,“結合五官特徵與深度資訊之人臉辨識系統”, 大同大學資訊工程研究所,碩士論文,2012。[33]Pearson, K., “LIII. On Lines and Planes of Closest Fit to Systems of Points in Space,” Philosophical Magazine., 1 Nov. 1901, 2(6), pp. 559–572
[34]R.A., Fisher, “The use of multiple measurements in taxonomic problems, ” Annual Eugenics, 7: 179-188, 1936
[35]T. Ojala, M. Pietikäinen, and D. Harwood, “T. Ojala, M. Pietikäinen, and D. Harwood, ” in Proceedings of 12th International Conference on Pattern Recognition(ICPR), Jerusalem, Israel, Israel, 9-13 Oct. 1994, pp. 582-585.
[36]B. Hatipoglu and C. Köse, “Gender recognition from face images using PCA and LBP, ” in Proceedings of 9th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey, 26-28 Nov. 2015, pp. 1258-1262.
[37]A. A. M. Hagar ,M. A. M. Alshewimy, and M. T. F. Saidahmed, “A new object recognition framework based on PCA, LDA, and K-NN, ” in Proceedings of 11th International Conference on Computer Engineering & Systems (ICCES), Cairo, Egypt, 20-21 Dec. 2016, pp. 141-146.
[38]Raspberry Pi (2016, February 29) raspberry pi 3 [Online].Available:https://www.raspberrypi.org/
[39]Arduino (2008, May 15) Arduino nano [Online].Available:https://www.arduino.cc/