A Person Authentication System Based on RFID Tags and a Cascade of Face Recognition Algorithms
暂无分享,去创建一个
[1] Josef Kittler,et al. A comparison of photometric normalisation algorithms for face verification , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[2] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[3] Daniel S. Yeung,et al. RFID access authorization by face recognition , 2009, 2009 International Conference on Machine Learning and Cybernetics.
[4] Rolf P. Würtz,et al. Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.
[5] Rama Chellappa,et al. Principal components null space analysis for image and video classification , 2006, IEEE Transactions on Image Processing.
[6] Josef Kittler,et al. A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] David J. Kriegman,et al. Acquiring linear subspaces for face recognition under variable lighting , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[9] Xiaohua Xie. Illumination preprocessing for face images based on empirical mode decomposition , 2014, Signal Process..
[10] Fabio Roli,et al. Personal identity verification by serial fusion of fingerprint and face matchers , 2009, Pattern Recognit..
[11] Craig I. Watson,et al. Studies of biometric fusion , 2006 .
[12] Takeo Kanade,et al. Recognizing Action Units for Facial Expression Analysis , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[13] Wen Gao,et al. A comparative study on illumination preprocessing in face recognition , 2013, Pattern Recognit..
[14] Moncef Gabbouj,et al. The 2013 face recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).
[15] Brian C. Lovell,et al. Video face matching using subset selection and clustering of probabilistic Multi-Region Histograms , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[16] Adnan Aff,et al. RFID and Face Recognition Based Security and Access Control System , 2013 .
[17] Qinghan Xiao,et al. Robust face detection from still images , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[18] Elgar Fleisch,et al. Serialized TID numbers - A headache or a blessing for RFID crackers? , 2009, 2009 IEEE International Conference on RFID.
[19] Avinash C. Kak,et al. PCA versus LDA , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[20] Zhan-Wei Song,et al. RFID-Based Security Authentication System Based on a Novel Face-Recognition Structure , 2010, 2010 WASE International Conference on Information Engineering.
[21] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[22] Sébastien Marcel,et al. The 2013 speaker recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).
[23] Alejandro F. Frangi,et al. Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .
[24] Gwo-Jia Jong,et al. Multi-recognition Combined Security System for Intelligent Car Electronics , 2012 .
[25] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[26] S. Ranjitha Kumari,et al. A Survey on Performance Analysis of DES , AES and RSA Algorithm along with LSB Substitution Technique , 2013 .
[27] Massimo Tistarelli,et al. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation , 2007, ICB.
[28] Herman Martins Gomes,et al. An Improved Face Verification Approach Based on Speedup Robust Features and Pairwise Matching , 2013, 2013 XXVI Conference on Graphics, Patterns and Images.
[29] Xudong Jiang,et al. Eigenfeature Regularization and Extraction in Face Recognition , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[30] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[31] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[32] Meng Joo Er,et al. Illumination compensation and normalization for robust face recognition using discrete cosine transform in logarithm domain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[33] Xiaoyang Tan,et al. Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, IEEE Transactions on Image Processing.
[34] Conrad Sanderson,et al. The VidTIMIT Database , 2002 .
[35] Ming Li,et al. 2D-LDA: A statistical linear discriminant analysis for image matrix , 2005, Pattern Recognit. Lett..
[36] Alex Pentland,et al. Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[37] Simon Dobrisek,et al. Exploiting representation plurality for robust and efficie nt face recognition , 2013 .
[38] Ashish Goel,et al. DESIGN AND ANALYSIS OF COMPOSITE LEAF SPRING FOR LIGHT VEHICLES , 2013 .
[39] Thomas B. Moeslund,et al. Extracting a Good Quality Frontal Face Image From a Low-Resolution Video Sequence , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[40] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[41] Jian-Huang Lai,et al. Normalization of Face Illumination Based on Large-and Small-Scale Features , 2011, IEEE Transactions on Image Processing.
[42] Jae-Woo Kim,et al. The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag , 2011, 2011 International Conference on Ubiquitous Computing and Multimedia Applications.
[43] Himani Agrawal. Matlab implementation, analysis & comparison of some RSA family cryptosystems , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.
[44] Tien Dzung Nguyen,et al. An efficient and reliable human resource management system based on a hybrid of face authentication and RFID technology , 2012, 2012 Fourth International Conference on Communications and Electronics (ICCE).
[45] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[46] Peter A. Flach. The Geometry of ROC Space: Understanding Machine Learning Metrics through ROC Isometrics , 2003, ICML.
[47] Xudong Jiang,et al. Interest point detection using rank order LoG filter , 2013, Pattern Recognit..
[48] Dae-Hee Seo,et al. Improved Authentication Scheme Using Facial Recognition Scheme Based on RFID Tag , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[49] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..