Architectures for efficient face authentication in embedded systems
暂无分享,去创建一个
Srivaths Ravi | Niraj K. Jha | Anand Raghunathan | Najwa Aaraj | N. Jha | A. Raghunathan | S. Ravi | N. Aaraj
[1] Norbert Krüger,et al. Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.
[2] Alex Pentland,et al. A Bayesian similarity measure for direct image matching , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[3] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[4] Srivaths Ravi,et al. Energy estimation for extensible processors , 2003, 2003 Design, Automation and Test in Europe Conference and Exhibition.
[5] Ira Krepchin,et al. Texas Instruments Inc. , 1963, Nature.
[6] Yajie Tian,et al. Handbook of face recognition , 2003 .
[7] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[8] D. B. Davis,et al. Intel Corp. , 1993 .
[9] Xilin Chen,et al. A PDA-based face recognition system , 2002, Sixth IEEE Workshop on Applications of Computer Vision, 2002. (WACV 2002). Proceedings..
[10] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[11] Luc Vandendorpe,et al. Independent component analysis for face authentication , 2002 .
[12] Michele Borgatti,et al. A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O , 2003 .
[13] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[14] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[15] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[16] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[17] Alex Park,et al. MULTI-MODAL FACE AND SPEAKER IDENTIFICATION ON A HANDHELD DEVICE , 2003 .
[18] Sunil Hattangady,et al. Reducing the Security Threats to 2.5G and 3G Wireless Applications , 2002 .