To see the other types of publications on this topic, follow the link: Face authentication.

Dissertations / Theses on the topic 'Face authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 dissertations / theses for your research on the topic 'Face authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Emambakhsh, Mehryar. "Using the 3D shape of the nose for biometric authentication." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.665386.

Full text
Abstract:
This thesis is dedicated to exploring the potential of the 3D shape of the nasal region for face recognition. In comparison to other parts of the face, the nose has a number of distinctive features that make it attractive for recognition purposes. It is relatively stable over different facial expressions, easy to detect because of its salient convexity, and difficult to be intentionally cover up without attracting suspicion. In addition compared to other facial parts, such as forehead, chin, mouth and eyes, the nose is not vulnerable to unintentional occlusions caused by scarves or hair. Prior
APA, Harvard, Vancouver, ISO, and other styles
3

Tambay, Alain Alimou. "Testing Fuzzy Extractors for Face Biometrics: Generating Deep Datasets." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41429.

Full text
Abstract:
Biometrics can provide alternative methods for security than conventional authentication methods. There has been much research done in the field of biometrics, and efforts have been made to make them more easily usable in practice. The initial application for our work is a proof of concept for a system that would expedite some low-risk travellers’ arrival into the country while preserving the user’s privacy. This thesis focuses on the subset of problems related to the generation of cryptographic keys from noisy data, biometrics in our case. This thesis was built in two parts. In the first,
APA, Harvard, Vancouver, ISO, and other styles
4

Aronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.

Full text
Abstract:
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognit
APA, Harvard, Vancouver, ISO, and other styles
5

ALI, ARSLAN. "Deep learning techniques for biometric authentication and robust classification." Doctoral thesis, Politecnico di Torino, 2021. http://hdl.handle.net/11583/2910084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO, and other styles
7

Bin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.

Full text
Abstract:
Biometric authentication systems provide alternative solutions to traditional methods that are based on knowledge (e.g. password) or physical tokens (e.g., smart card). Many studies now focus on getting high accuracy rates for biometric verification. However,with advances in technology, biometric data (e.g. fingerprint, face, iris) can be captured/sniffed, duplicated, modified, and then resubmitted in the same or in other applications that utilize the same biometric features. Watermarking techniques can be used effectively to protect the genuine ownership of biometric data, either to accept or
APA, Harvard, Vancouver, ISO, and other styles
8

Akalin, Volkan. "Face Recognition Using Eigenfaces And Neural Networks." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1055912/index.pdf.

Full text
Abstract:
A face authentication system based on principal component analysis and neural networks is developed in this thesis. The system consists of three stages<br>preprocessing, principal component analysis, and recognition. In preprocessing stage, normalization illumination, and head orientation were done. Principal component analysis is applied to find the aspects of face which are important for identification. Eigenvectors and eigenfaces are calculated from the initial face image set. New faces are projected onto the space expanded by eigenfaces and represented by weighted sum of the eigenfaces. Th
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Teewoon. "HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING." University of Sydney. Electrical and Information Engineering, 2004. http://hdl.handle.net/2123/586.

Full text
Abstract:
Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still remains a challenging problem because of the complexity of the human face. In this thesis we describe fully automatic solutions that can locate faces and then perform identification and verification. We present a solution for face localisation using eye locations. We derive an efficient representation for the decision hyperplane of linear and nonlinear Support Vector Machines (SVMs). For this we introduce the novel concept of $\rho$ and $\eta$ prototypes
APA, Harvard, Vancouver, ISO, and other styles
10

Tan, Teewoon. "HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING." Thesis, The University of Sydney, 2003. http://hdl.handle.net/2123/586.

Full text
Abstract:
Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still remains a challenging problem because of the complexity of the human face. In this thesis we describe fully automatic solutions that can locate faces and then perform identification and verification. We present a solution for face localisation using eye locations. We derive an efficient representation for the decision hyperplane of linear and nonlinear Support Vector Machines (SVMs). For this we introduce the novel concept of $\rho$ and $\eta$ prototypes
APA, Harvard, Vancouver, ISO, and other styles
11

Pereira, Tiago de Freitas 1985. "A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261478.

Full text
Abstract:
Orientador: José Mario De Martino<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-23T20:06:41Z (GMT). No. of bitstreams: 1 Pereira_TiagodeFreitas_M.pdf: 17638731 bytes, checksum: 15a8d07214e3b31accd3218e5bde20cb (MD5) Previous issue date: 2013<br>Resumo: O Resumo poderá ser visualizado no texto completo da tese digital<br>Abstract: The complete Abstract is available with the full electronic document.<br>Mestrado<br>Engenharia de Computação<br>Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
12

Marinho, Adriano da Silva. "Uma nova versão de um sistema de detecção e reconhecimento de face utilizando a Transformada Cosseno Discreta." Universidade Federal da Paraí­ba, 2012. http://tede.biblioteca.ufpb.br:8080/handle/tede/6088.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:36:38Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2501696 bytes, checksum: a1f65e686060aa68aa5e43dee1e6c0b5 (MD5) Previous issue date: 2012-07-30<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>Reliable identification systems have become key components in many applications that provide services to authenticated users. Since traditional authentication methods (such as using passwords or smartcards) can be manipulated in order to bypass the systems, biometric authentication methods have been receiving more attention in recent years
APA, Harvard, Vancouver, ISO, and other styles
13

Hariri, Walid. "Contribution à la reconnaissance/authentification de visages 2D/3D." Thesis, Cergy-Pontoise, 2017. http://www.theses.fr/2017CERG0905/document.

Full text
Abstract:
L’analyse de visages 3D y compris la reconnaissance des visages et des expressions faciales 3D est devenue un domaine actif de recherche ces dernières années. Plusieurs méthodes ont été développées en utilisant des images 2D pour traiter ces problèmes. Cependant, ces méthodes présentent un certain nombre de limitations dépendantes à l’orientation du visage, à l’éclairage, à l’expression faciale, et aux occultations. Récemment, le développement des capteurs d’acquisition 3D a fait que les données 3D deviennent de plus en plus disponibles. Ces données 3D sont relativement invariables à l’illumin
APA, Harvard, Vancouver, ISO, and other styles
14

Рижова, А. С. "Інформаційно-екстремальний метод аутентифікації користувача за фотографією обличчя". Thesis, Сумський державний університет, 2014. http://essuir.sumdu.edu.ua/handle/123456789/39146.

Full text
Abstract:
У сучасному інформаційному суспільстві збільшується сегмент систем людино-машинної взаємодії на базі інтелектуальних компонентів. Серед задач, що вирішують ці компоненти, варто виділити персоналізацію та аутентифікацію користувача інформаційних баз чи соціальних сервісів, які перспективно вирішувати на базі вбудованих відеокамер через їх поширеність в складі мобільних пристроїв.
APA, Harvard, Vancouver, ISO, and other styles
15

Дмитерко, Василь Миколайович, та Vasyl Dmyterko. "дослідження систем підтримки прийняття рішень в біометричних системах аутентифікації". Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2017. http://elartu.tntu.edu.ua/handle/123456789/19006.

Full text
Abstract:
Дипломна робота присвячена дослідженню систем підтримки прийняття рішень в біометричних системах аутентифікації. Удосконалення полягає у розробці способу виділення біометричних параметрів на основі контрольних точок обличчя. Також виконано огляд основних принципів та методів біометричної аутентифікації та ідентифікації, огляд біометричних способів аутентифікації людини за рисами обличчя, а також наведено відомості про існуючі системи ідентифікації та програми для аутентифікації по обличчю. Було досліджено зразки у вигляді цифрових фото людини та на їх основі розроблено спосіб виділення біом
APA, Harvard, Vancouver, ISO, and other styles
16

Penteado, Bruno Elias [UNESP]. "Autenticação biométrica de usuários em sistemas de E-learning baseada em reconhecimento de faces a partir de vídeo." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/98692.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:40Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-07-27Bitstream added on 2014-06-13T20:59:56Z : No. of bitstreams: 1 penteado_be_me_sjrp.pdf: 1032009 bytes, checksum: 4cf143854132e42249128674b69ba77b (MD5)<br>Nos últimos anos tem sido observado um crescimento exponencial na oferta de cursos a distância realizados pela Internet, decorrente de suas vantagens e características (menores custos de distribuição e atualização de conteúdo, gerenciamento de grandes turmas, aprendizado assíncrono e geograficamente independente, etc.), bem como de s
APA, Harvard, Vancouver, ISO, and other styles
17

Penteado, Bruno Elias. "Autenticação biométrica de usuários em sistemas de E-learning baseada em reconhecimento de faces a partir de vídeo /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98692.

Full text
Abstract:
Orientador: Aparecido Nilceu Elias<br>Banca: Agma Juci Machado Traina<br>Banca: Wilson Massashiro Yonezawa<br>Resumo: Nos últimos anos tem sido observado um crescimento exponencial na oferta de cursos a distância realizados pela Internet, decorrente de suas vantagens e características (menores custos de distribuição e atualização de conteúdo, gerenciamento de grandes turmas, aprendizado assíncrono e geograficamente independente, etc.), bem como de sua regulamentação e apoio governamental. Entretanto, a falta de mecanismos eficazes para assegurar a autenticação dos alunos neste tipo de ambiente
APA, Harvard, Vancouver, ISO, and other styles
18

Yadav, Tarun Kumar. "Automatic Detection and Prevention of Fake Key Attacks in Signal." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/9072.

Full text
Abstract:
The Signal protocol provides end-to-end encryption for billions of users in popular instant messaging applications like WhatsApp, Facebook Messenger, and Google Allo. The protocol relies on an app-specific central server to distribute public keys and relay encrypted messages between the users. Signal prevents passive attacks. However, it is vulnerable to some active attacks due to its reliance on a trusted key server. A malicious key server can distribute fake keys to users to perform man-in-the-middle or impersonation attacks. Signal applications support an authentication ceremony to detect t
APA, Harvard, Vancouver, ISO, and other styles
19

Murphy, Caroline (Caroline Elizabeth). "Fact and sanctity : authenticating laudianism in the English Monasticon anglicanum's architectural prints (1655)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106421.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Architecture, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 111-119).<br>This thesis takes as its focus the set of illustrated plates of monastic churches and cathedrals that interleave the first volume of the Monasticon Anglicanun, a monumental Latin antiquarian tome on England's dissolved monastic establishments published in 1655. It was arranged by the antiquaries William Dugdale and Roger Dodsworth from compiled transcriptions of monastic foundation charters, and was illustrate
APA, Harvard, Vancouver, ISO, and other styles
20

Tai, Chiu-Yuan, and 戴久芫. "Anti-cheat methods for face authentication system spoofed by high resolution fake face." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/jxte5t.

Full text
Abstract:
碩士<br>亞東技術學院<br>資訊與通訊工程研究所<br>103<br>Due to the multiple convenient qualities (quick, remote detection ability, non-contact), face detection has been widely applied in fields such as access control, monitoring, auto focusing systems, or verification of the subject’s identity and behavior. However, with the widespread adoption of face detection technique, spoofing technique had become increasingly advanced with face Information being forged or collected to deceive or bypass the verification of face detection system. Thus, it is crucial for the biometric system to identify the forged characteris
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Ke-Zhao, and 陳科兆. "Video-based Face Authentication Using Appearance Models." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/63184216675446029330.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程所<br>93<br>In this thesis, we present a novel face authentication scheme by using appearance models and Hidden Markov Models. In our face authentication system, it can be roughly divided into two parts. First, the appearance model is used for features extraction, because an appearance model can not only extract the texture information, but also extract the shape information. We consider the shape information of a face is useful for the face authentication. Thus, we train an appearance model with a training set of labeled image sequences and then use this model to extract th
APA, Harvard, Vancouver, ISO, and other styles
22

SINGH, PANKAJ. "SECURE AUTHENTICATION USING EYE TRACKING." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14664.

Full text
Abstract:
Face recognition is commonly used techniques for secure. However, available face authentication systems are vulnerable to simple spoofing attacks. We can easily spoofing, using low resolution photo representative of those commonly posted online. We can put those images in place of real user and break these secure system easily. In one project SAFE (Secure Authentication with Face and Eyes), an improved face authentication method that uses a commodity gaze tracker to input a secret. During authentication, the user must not only show her face but also gaze at a secret icon that moves across the
APA, Harvard, Vancouver, ISO, and other styles
23

HUANG, YU-TING, and 黃毓庭. "Rapid Identity Authentication System Based On Face Recognition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/00756799098747815028.

Full text
Abstract:
碩士<br>國立臺北教育大學<br>資訊科學系碩士班<br>105<br>As scientific technology has continuously improved and developed, rapidity and accuracy has become the basic and essential features of biometric identification. There are many different kinds of methods to deal with objects comparison in biometric identification. For instance, shape detection and edge detection are both commonly used in biometric identification. However, face recognition is a typically integrated application of image analysis, image decomposition and classification. While the face is the most complex biological feature which the widest vari
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Cheng-Wei, and 楊政偉. "Local Transform Features and Hybridization for Face Authentication." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/52555783961692864689.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系在職專班<br>104<br>In the digital era, we have to identify everyone to protect individual rights and information for bureau of entry and exit, network transactions, entry access control at home or corporate, etc. Traditional identity authentication methods have been insufficient for our needs, for example ID card, seal certification, etc. Currently, biometric technology is the most convenient and secure way on fingerprint authentication, face authentication, retina authentication, etc. In biometrics, face authentication not only has the highest acceptance of general public, b
APA, Harvard, Vancouver, ISO, and other styles
25

Tseng, Tz-Chia, and 曾子家. "Anti-Spoofing of Live Face Authentication on Smartphone." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/7j6fm5.

Full text
Abstract:
碩士<br>國立臺灣大學<br>生醫電子與資訊學研究所<br>107<br>Our proposed method is capable of authenticating the input image is from real user or spoofing attack, including paper photograph, digital photograph, and video, using only the Red, Green, Blue (RGB) frontal camera of common smart phone, without the help of depth camera or infrared thermal sensor. We first capture live faces in each frame of input video streams by single shot multi-box detector then feed into our designed convolution neural network after certain data augmentation and finally obtain a well-trained spoof face classifier.
APA, Harvard, Vancouver, ISO, and other styles
26

"Face authentication on mobile devices: optimization techniques and applications." 2005. http://library.cuhk.edu.hk/record=b5892581.

Full text
Abstract:
Pun Kwok Ho.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.<br>Includes bibliographical references (leaves 106-111).<br>Abstracts in English and Chinese.<br>Chapter 1. --- Introduction --- p.1<br>Chapter 1.1 --- Background --- p.1<br>Chapter 1.1.1 --- Introduction to Biometrics --- p.1<br>Chapter 1.1.2 --- Face Recognition in General --- p.2<br>Chapter 1.1.3 --- Typical Face Recognition Systems --- p.4<br>Chapter 1.1.4 --- Face Database and Evaluation Protocol --- p.5<br>Chapter 1.1.5 --- Evaluation Metrics --- p.7<br>Chapter 1.1.6 --- Characteristics of Mobile Devices ---
APA, Harvard, Vancouver, ISO, and other styles
27

Van, der Haar Dustin Terence. "Face recognition-based authentication and monitoring in video telecommunication systems." Thesis, 2012. http://hdl.handle.net/10210/5024.

Full text
Abstract:
M.Sc. (Computer Science)<br>A video conference is an interactive meeting between two or more locations, facilitated by simultaneous two-way video and audio transmissions. People in a video conference, also known as participants, join these video conferences for business and recreational purposes. In a typical video conference, we should properly identify and authenticate every participant in the video conference, if information discussed during the video conference is confidential. This prevents unauthorized and unwanted people from being part of the conference and exposing any confidential in
APA, Harvard, Vancouver, ISO, and other styles
28

Ayyagari, Venkat Rao. "Post invariant 3D face authentication based on Gaussian fields approach." 2005. http://etd.utk.edu/2005/AyyagariVenkat.pdf.

Full text
Abstract:
Thesis (M.S.) -- University of Tennessee, Knoxville, 2005.<br>Title from title page screen (viewed on January 30, 2006). Thesis advisor: Mongi A. Abidi. Document formatted into pages (xiii, 110 p. : ill. (some col.)). Vita. Includes bibliographical references (p. 103-109).
APA, Harvard, Vancouver, ISO, and other styles
29

li-Yu-Sin and 李鈺新. "Real-time Face Recognition for Multi-user Authentication on Smartphones." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/qkbktj.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cho, Chien-Lung, and 卓建隆. "Authentication of Biosignal Transmission Based on Face Recognition for Telemedicine." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/03211355438242624239.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>94<br>Telemedicine has been defined as the use of telecommunications to provide medical information and services. By the transmission of electronic signals from one site to another, people can have the same medical care as that in hospital. Recently with the advancement of internet technology, the telemedicine is more convenient and acceptable to people. Although telemedicine makes long-distance medical services possible, it is not completely suitable to each user. As result of the internet security, telemedicine must have complicated procedures of authentications t
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Ying-Yu, and 王穎宇. "Parallel-AdaBoost Blink Detection for Live Face Recognition Authentication Systemand Its Embedded 4-Factor Authentication System Implementation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/3t77ru.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電機工程系<br>102<br>Conventional face recognition authentication system is unable to discriminate real-world human faces from faces in the photo or in the video, and is easily faked by faces in the photo or in the video. So live face recognition authentication system with accurate live detection is getting fundamental and crucial. In order to accomplish real-time live face recognition authentication system, live detection based on blink detection and some extra simple live motion analysis is a cost-effective and high-practicability auxiliary method, especially the blink detection
APA, Harvard, Vancouver, ISO, and other styles
32

Hsin-TingWu and 吳欣庭. "Increasing Pairs of Makeup and Non-makeup Face Dataset Using Face Authentication Based on Partial Least Squares." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/92235854203608376554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chang, Yea-Hsin, and 張逸昕. "Analyzing the Product Development and Competition Strategy of Microsoft Face Authentication Feature." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80891614323304750428.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>104<br>Microsoft Face Authentication is a new feature of Windows 10, Human’s unique face pattern can be used as a digital certificate, be as an alternative solution of password, in order to sign-in protected systems. By comparing with previous OS version, it brings up product differentiation to users, and may activate their upgrade motivation. Furthermore, this feature works with cloud services by two-factor authentication, is another security enhancement feature. Face Authentication is required to work with specific IR camera design, therefore the marketing sha
APA, Harvard, Vancouver, ISO, and other styles
34

Chang, Hung-tu, and 張宏圖. "Automatic Energy Saving and Security Authentication Using Real-Time Face Detection and Verification." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/14983995469443652707.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系碩士在職專班<br>100<br>In this thesis, an automatic energy saving and security authentication device using real-time face detection and verification is presented. Traditional consumer electronics devices do not have real-time auto shut-off function when users leave or forget to turn off the machine. It consequently results in energy wasting and the threat to security and confidentiality. Although nuclear power is cheap and high-efficiency, it will seriously endanger human health and environment once pollution occurs. To achieve the goals of energy-saving, carbon reduction, and
APA, Harvard, Vancouver, ISO, and other styles
35

Lu, Shey-Shin, and 呂學信. "Study on the Face Membership Authentication Based on the Combination of SVDD and SVM Classifiers." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/09626081612779891343.

Full text
Abstract:
碩士<br>中原大學<br>機械工程研究所<br>95<br>Owing to the urgent demand of the security system in recent year, the technology related to identity authentication using biometrics has received much attention. Biometrics such as retina, fingerprint, voiceprint and human face of every individual are unique and exclusive. Among these natures, facial feature-based recognition is one of the most straightforward and feasible ways to develop identity authentication systems. For face membership authentication systems, the challenge is how to collect numerous data for the training process, especially the unknown nonmem
APA, Harvard, Vancouver, ISO, and other styles
36

Sueng, Chien-Cheng, and 宋健誠. "Fast Stretching Homomorphic Filter for Illumination/Shadow/Contrast Normalizationand Its Android Face Recognition Authentication Implementation." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55794412803474638309.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電機工程系碩士班<br>100<br>The accuracy of face recognition system is inevitably error-prone to environmental interference, like illumination, light color, and shadow. So illumination/shadow/contrast normalization is the key point to the reliability of face recognition system. This thesis proposes a simple but practical method for illumination/shadow/contrast normalization, and improves face recognition system’s robustness to environmental illumination, irregular shadow, and light color variation. In order to achieve all normalization of illumination, shadow, and contrast, this thesi
APA, Harvard, Vancouver, ISO, and other styles
37

Liao, Wei-Hsiang, and 廖偉翔. "Distance Transform and Circle Matching for Precise Eye Detectionand Its Android Face Recognition Authentication Implementation." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/83036549079565357934.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電機工程系碩士班<br>100<br>In face recognition system, eye coordinate localized by the step of eye detection is the key information foundation to the steps of pose normalization, geometry normalization, and illumination/shadow/contrast normalization. Once the steps of pose normalization, geometry normalization, and illumination/shadow/contrast normalization work well, the variation of pose, geometry, and illumination among human faces can be suppressed, and the subsequent steps of feature extraction and feature matching can have an objective and fair basis. However, most conventional
APA, Harvard, Vancouver, ISO, and other styles
38

Chang, Ming-Yuan, and 張銘元. "An Automatic Management System for Human Face Recognition and Authentication Based on Intuitive and Conditional Facial Feature Comparison." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/24291076573205876199.

Full text
Abstract:
碩士<br>靜宜大學<br>資訊管理學系<br>89<br>Due to the wide applications of digital information, the usage of digital images is dramatically increased. If we can extract more valuable information from digital images, images will be getting more important. We try to count the number of human faces in a given image. And using this technology, image information can be converted into more valuable information to support decision-making process. In the first step, this paper will focus on the application of counting the number of human faces in a given digital image. By observation, we have found th
APA, Harvard, Vancouver, ISO, and other styles
39

Seidlová, Tereza. "Vybrané problémy českých médií a novinářské profese na příkladu pronikání smyšlených událostí a recesistických obsahů do zpravodajství." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-330484.

Full text
Abstract:
This diploma thesis focuses on the problematic aspects of the journalistic profession nowadays, namely on the example of the penetration of the mystifying jokes to the mainstream media. In three specific cases where the authors of the mystifying pranks managed to penetrate the media, the work illustrates the most common mistakes journalists can make and focuses on trends, which stand for these tendencies. Part of this work is the analysis of the mystifying contents that appeared on jokes websites, on Facebook or in the context of interpersonal communication, and subsequent analysis of the medi
APA, Harvard, Vancouver, ISO, and other styles
40

Silva, Henrique Joaquim Duarte da. "Uma solução de handover seguro com QoS em redes veiculares." Master's thesis, 2013. http://hdl.handle.net/1822/29435.

Full text
Abstract:
Dissertação de mestrado integrado em Engenharia de Comunicações<br>As redes veiculares surgiram como um caso particular de redes ad hoc móveis denominadas por MANETS (Mobile Ad-hoc Networks), formando um campo específico de pesquisa na área de redes de computadores. As VANETs, (Vehicular Ad-hoc Networks) têm sido alvo de várias pesquisas científicas para o desenvolvimento do Sistema Inteligente de Transporte, sendo agora possível incluir nos automóveis software inteligente que melhorara a qualidade de vida dos condutores, através por exemplo de aplicações de entretenimento das quais se d
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!