Academic literature on the topic 'Face authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Face authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Face authentication"
R.S., Dr Sabeenian. "Attendance Authentication System Using Face Recognition." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 1235–48. http://dx.doi.org/10.5373/jardcs/v12sp4/20201599.
Full textBeumier, C., and M. Acheroy. "Automatic 3D face authentication." Image and Vision Computing 18, no. 4 (March 2000): 315–21. http://dx.doi.org/10.1016/s0262-8856(99)00052-9.
Full textChen, Xiang, Shouzhi Xu, Kai Ma, and Peng Chen. "Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition." Information 13, no. 11 (November 10, 2022): 535. http://dx.doi.org/10.3390/info13110535.
Full textReddy, Reddy Phanidhar. "Voice and Face Recognition for Web Browser Security." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 199–205. http://dx.doi.org/10.22214/ijraset.2021.38777.
Full textEt. al., R. P. Dahake,. "Face Recognition from Video using Threshold based Clustering." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 272–85. http://dx.doi.org/10.17762/turcomat.v12i1s.1768.
Full textSadashiv, Wagh Kishor, Anushka Bagal, Abhijit Khatri, Maitrayee Dhumal, and Sofiya Shaikh. "Face and Voice Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1670–73. http://dx.doi.org/10.22214/ijraset.2022.42452.
Full textHanafi, M., and W. A. W. Adnan. "Boosted Features for Face Authentication." Applied Mechanics and Materials 666 (October 2014): 276–81. http://dx.doi.org/10.4028/www.scientific.net/amm.666.276.
Full textPremkumar, J., K. Sughasri, Angel Preethi, and E. Kavitha. "Automized Pharmacy Using Face Authentication." Journal of Physics: Conference Series 1937, no. 1 (June 1, 2021): 012024. http://dx.doi.org/10.1088/1742-6596/1937/1/012024.
Full textGuodong Guo, Lingyun Wen, and Shuicheng Yan. "Face Authentication With Makeup Changes." IEEE Transactions on Circuits and Systems for Video Technology 24, no. 5 (May 2014): 814–25. http://dx.doi.org/10.1109/tcsvt.2013.2280076.
Full textTistarelli, M., and E. Grosso. "Active vision-based face authentication." Image and Vision Computing 18, no. 4 (March 2000): 299–314. http://dx.doi.org/10.1016/s0262-8856(99)00059-1.
Full textDissertations / Theses on the topic "Face authentication"
Emambakhsh, Mehryar. "Using the 3D shape of the nose for biometric authentication." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.665386.
Full textTambay, Alain Alimou. "Testing Fuzzy Extractors for Face Biometrics: Generating Deep Datasets." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41429.
Full textAronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.
Full textPorubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.
Full textBin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.
Full textAkalin, Volkan. "Face Recognition Using Eigenfaces And Neural Networks." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1055912/index.pdf.
Full textpreprocessing, principal component analysis, and recognition. In preprocessing stage, normalization illumination, and head orientation were done. Principal component analysis is applied to find the aspects of face which are important for identification. Eigenvectors and eigenfaces are calculated from the initial face image set. New faces are projected onto the space expanded by eigenfaces and represented by weighted sum of the eigenfaces. These weights are used to identify the faces. Neural network is used to create the face database and recognize and authenticate the face by using these weights. In this work, a separate network was build for each person. The input face is projected onto the eigenface space first and new descriptor is obtained. The new descriptor is used as input to each person&
#8217
s network, trained earlier. The one with maximum output is selected and reported as the host if it passes predefined recognition threshold. The algorithms that have been developed are tested on ORL, Yale and Feret Face Databases.
Tan, Teewoon. "HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING." University of Sydney. Electrical and Information Engineering, 2004. http://hdl.handle.net/2123/586.
Full textTan, Teewoon. "HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING." Thesis, The University of Sydney, 2003. http://hdl.handle.net/2123/586.
Full textPereira, Tiago de Freitas 1985. "A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261478.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-23T20:06:41Z (GMT). No. of bitstreams: 1 Pereira_TiagodeFreitas_M.pdf: 17638731 bytes, checksum: 15a8d07214e3b31accd3218e5bde20cb (MD5) Previous issue date: 2013
Resumo: O Resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete Abstract is available with the full electronic document.
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Marinho, Adriano da Silva. "Uma nova versão de um sistema de detecção e reconhecimento de face utilizando a Transformada Cosseno Discreta." Universidade Federal da Paraíba, 2012. http://tede.biblioteca.ufpb.br:8080/handle/tede/6088.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
Reliable identification systems have become key components in many applications that provide services to authenticated users. Since traditional authentication methods (such as using passwords or smartcards) can be manipulated in order to bypass the systems, biometric authentication methods have been receiving more attention in recent years. One of the biometric traits is the face. The problem of recognizing faces in video and photo still is an object of research, since there are many factors that influence the detection and recognition, such as lighting, position of the face, the background image, different facial expressions, etc. One can perform face recognition using Discrete Cosine Transform (DCT). In order to adjust a face recognition system to uncontrolled environments, two improvements for it were developed in this work: a image normalization module with respect to rotation and scale, and a change in the feature extraction module through the insertion of a non-ideal low-pass filter. The system and its modifications were tested on the following face databases: UFPB, ORL, Yale, and VSoft GTAV, developed specially for the job. Tests showed the efficiency of the image normalization module, but the system still is not adequate for every environment.
Sistemas de identificação confiáveis tornaram-se componentes chaves de várias aplicações que disponibilizam serviços para usuários autenticados. Uma vez que métodos de autenticação tradicionais (como os que utilizam senhas ou smartcards) podem ser manipulados com o objetivo de burlar os sistemas, métodos de autenticação biométrica vêm recebendo mais atenção nos últimos anos. Um dos traços biométricos é a face. O problema do reconhecimento de faces em vídeo e foto é objeto de pesquisa, uma vez que existem muitos fatores que influenciam na detecção e no reconhecimento, tais como: iluminação, posição da face, imagem ao fundo, diferentes expressões faciais, etc. É possível realizar reconhecimento facial utilizando a Transformada Cosseno Discreta (DCT). Com o intuito de adequar um Sistema de Detecção e Reconhecimento de Faces a ambientes não controlados, neste trabalho foram desenvolvidas duas melhorias para ele: um módulo normalizador de imagens em relação à rotação e à escala e uma modificação na etapa de seleção de atributos, por meio da inserção de um filtro passa-baixas não ideal. O sistema e suas modificações foram testados nos bancos de faces UFPB, ORL, Yale, GTAV e Vsoft, desenvolvido especialmente para o trabalho. Os testes mostraram a eficácia do módulo de normalização da imagem, mas ainda assim o sistema não é adequado para qualquer ambiente.
Books on the topic "Face authentication"
Real or fake: Studies in authentication. Lexington, Ky: University Press of Kentucky, 2009.
Find full textBaseball autograph handbook: A comprehensive guide to authentication and valuation of Hall of Fame autographs. Iola, Wis: Krause Publications, 1989.
Find full textOffice, General Accounting. Electronic government: Planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.
Find full textFeng, Guocan, Tieniu Tan, Stan Z. Li, Yunhong Wang, and Jianhuang Lai. Advances in Biometric Person Authentication: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings. Springer London, Limited, 2004.
Find full textPankanti, Sharath, Tieniu Tan, Stan Z. Li, Gérard Chollet, and Zhenan Sun. Advances in Biometric Person Authentication: International Workshop on Biometric Recognition Systems, IWBRS 2005, Beijing, China, October 22 - 23, 2005, Proceedings. Springer London, Limited, 2005.
Find full text(Editor), Stan Z. Li, Zhenan Sun (Editor), Tieniu Tan (Editor), Sharath Pankanti (Editor), Gérard Chollet (Editor), and David Zhang (Editor), eds. Advances in Biometric Person Authentication: International Workshop on Biometric Recognition Systems, IWBRS 2005, Beijing, China, October 22 23, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.
Find full textNickell, Joe. Real or Fake: Studies in Authentication. University Press of Kentucky, 2009.
Find full textNickell, Joe. Real or Fake: Studies in Authentication. University Press of Kentucky, 2009.
Find full textBaker, Mark Allen. Baseball autograph handbook: A comprehensive guide to authentication and valuation of Hall of Fame autographs. Krause Publications, 1990.
Find full textBook chapters on the topic "Face authentication"
Gutta, Srinivas, and Harry Wechsler. "Face Recognition Using Asymmetric Faces." In Biometric Authentication, 162–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_23.
Full textKompanets, Leonid. "Biometrics of Asymmetrical Face." In Biometric Authentication, 67–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_10.
Full textNgo, David C. L., Andrew B. J. Teoh, and Alwyn Goh. "Eigenspace-Based Face Hashing." In Biometric Authentication, 195–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_27.
Full textCzyz, Jacek, Mohammad Sadeghi, Josef Kittler, and Luc Vandendorpe. "Decision Fusion for Face Authentication." In Biometric Authentication, 686–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_93.
Full textNanni, Loris, Annalisa Franco, and Raffalele Cappelli. "Towards a Robust Face Detector." In Biometric Authentication, 57–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_6.
Full textCappelli, Raffaele, Dario Maio, and Davide Maltoni. "Subspace Classification for Face Recognition." In Biometric Authentication, 133–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1_14.
Full textBigün, J., B. Duc, F. Smeraldi, S. Fischer, and A. Makarov. "Multi-Modal Person Authentication." In Face Recognition, 26–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72201-1_2.
Full textLu, Xiaoguang, Dirk Colbry, and Anil K. Jain. "Matching 2.5D Scans for Face Recognition." In Biometric Authentication, 30–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_5.
Full textTistarelli, Massimo, Andrea Lagorio, and Enrico Grosso. "Understanding Iconic Image-Based Face Biometrics." In Biometric Authentication, 19–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1_3.
Full textWang, Xiaogang, and Xiaoou Tang. "Hallucinating Face by Eigentransformation with Distortion Reduction." In Biometric Authentication, 88–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_13.
Full textConference papers on the topic "Face authentication"
Barra, Silvio, Maria De Marsico, Chiara Galdi, Daniel Riccio, and Harry Wechsler. "FAME: Face Authentication for Mobile Encounter." In 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS). IEEE, 2013. http://dx.doi.org/10.1109/bioms.2013.6656140.
Full textHemery, B., J. Mahier, M. Pasquet, and C. Rosenberger. "Face Authentication for Banking." In First International Conference on Advances in Computer-Human Interaction. IEEE, 2008. http://dx.doi.org/10.1109/achi.2008.17.
Full textTanwar, Shivam, Pronika Chawla, Rosy Maadan, and Preet Bhadana. "Authentication of Face using Matlab." In 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2020. http://dx.doi.org/10.1109/icces48766.2020.9137979.
Full textZhang, Xinman, Kunlei Jing, Yixuan Dai, and Xuebin Xu. "Face Biometric Identity Authentication System." In 2018 IEEE 4th International Conference on Computer and Communications (ICCC). IEEE, 2018. http://dx.doi.org/10.1109/compcomm.2018.8780645.
Full textDabbah, M. A., W. L. Woo, and S. S. Dlay. "Secure Authentication for Face Recognition." In 2007 IEEE Symposium on Computational Intelligence in Image and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/ciisp.2007.369304.
Full textZhou, Xinyan, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. "NAuth: Secure Face-to-Face Device Authentication via Nonlinearity." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737572.
Full textFuruie, Ryo, Yuji Goda, and Lifeng Zhang. "Detecting Fake Face Input for Face Authentication by DCT with Compensating the Main Spindle Position of Face." In The 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015. The Institute of Industrial Application Engineers, 2015. http://dx.doi.org/10.12792/icisip2015.032.
Full textZhang, Lifeng, Zhimei Yang, Takaharu Koda, and Hiroshi Kondo. "Face authentication using Orthogonal Transform signs." In 2006 International Symposium on Communications and Information Technologies. IEEE, 2006. http://dx.doi.org/10.1109/iscit.2006.339915.
Full textRosenberger, Christophe, and Luc Brun. "Similarity-based matching for face authentication." In 2008 19th International Conference on Pattern Recognition (ICPR). IEEE, 2008. http://dx.doi.org/10.1109/icpr.2008.4761860.
Full textMallauran, Caroline, Jean-Luc Dugelay, Florent Perronnin, and Christophe Garcia. "Online face detection and user authentication." In the 13th annual ACM international conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1101149.1101185.
Full textReports on the topic "Face authentication"
Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, December 2020. http://dx.doi.org/10.34074/ocds.086.
Full text