A facial presence monitoring system for information security
暂无分享,去创建一个
[1] John Chirillo,et al. Implementing Biometric Security , 2003 .
[2] Richard E. Smith,et al. Authentication: From Passwords to Public Keys , 2001 .
[3] Qinghan Xiao,et al. Technology review - Biometrics-Technology, Application, Challenge, and Computational Intelligence Solutions , 2007, IEEE Computational Intelligence Magazine.
[4] P. Jonathon Phillips,et al. Face Recognition Vendor Test 2002: Technical Appendices , 2003 .
[5] Kongqiao Wang,et al. A hierarchical multiscale and multiangle system for human face detection in a complex background using gravity-center template , 1999, Pattern Recognit..
[6] P. Jonathon Phillips,et al. Face recognition vendor test 2002 , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).
[7] Sandeep Kumar,et al. Using Continuous Face Verification to Improve Desktop Security , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.
[8] Václav Matyás,et al. Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..
[9] Matthew Turk,et al. Continuous Multimodal Authentication Using Dynamic Bayesian Networks , 2006 .
[10] Gary R. Bradski,et al. Real time face and object tracking as a component of a perceptual user interface , 1998, Proceedings Fourth IEEE Workshop on Applications of Computer Vision. WACV'98 (Cat. No.98EX201).
[11] Stan Z. Li,et al. Face recognition using the nearest feature line method , 1999, IEEE Trans. Neural Networks.
[12] Richard Dosselmann,et al. Automatically Log Off Upon Disappearance of Facial Image , 2005 .
[13] R. Ramnath,et al. Physical Access Protection using Continuous Authentication , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[14] Roberto Sassi,et al. A fuzzy approach to multimodal biometric continuous authentication , 2008, Fuzzy Optim. Decis. Mak..
[15] Narendra Ahuja,et al. Detecting Faces in Images: A Survey , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Paul Reid,et al. Biometrics for Network Security , 2003 .
[17] Thomas S. Huang,et al. Human face detection in a complex background , 1994, Pattern Recognit..
[18] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[19] Bernadette Dorizzi,et al. PSO versus AdaBoost for feature selection in multimodal biometrics , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[20] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics , 1995 .
[21] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[22] Ioannis Pitas,et al. Rule-based face detection in frontal views , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[23] Saad Ahmed Sirohey,et al. Human Face Segmentation and Identification , 1998 .