Journal articles on the topic 'Face authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Face authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
R.S., Dr Sabeenian. "Attendance Authentication System Using Face Recognition." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 1235–48. http://dx.doi.org/10.5373/jardcs/v12sp4/20201599.
Full textBeumier, C., and M. Acheroy. "Automatic 3D face authentication." Image and Vision Computing 18, no. 4 (March 2000): 315–21. http://dx.doi.org/10.1016/s0262-8856(99)00052-9.
Full textChen, Xiang, Shouzhi Xu, Kai Ma, and Peng Chen. "Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition." Information 13, no. 11 (November 10, 2022): 535. http://dx.doi.org/10.3390/info13110535.
Full textReddy, Reddy Phanidhar. "Voice and Face Recognition for Web Browser Security." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 199–205. http://dx.doi.org/10.22214/ijraset.2021.38777.
Full textEt. al., R. P. Dahake,. "Face Recognition from Video using Threshold based Clustering." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 272–85. http://dx.doi.org/10.17762/turcomat.v12i1s.1768.
Full textSadashiv, Wagh Kishor, Anushka Bagal, Abhijit Khatri, Maitrayee Dhumal, and Sofiya Shaikh. "Face and Voice Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1670–73. http://dx.doi.org/10.22214/ijraset.2022.42452.
Full textHanafi, M., and W. A. W. Adnan. "Boosted Features for Face Authentication." Applied Mechanics and Materials 666 (October 2014): 276–81. http://dx.doi.org/10.4028/www.scientific.net/amm.666.276.
Full textPremkumar, J., K. Sughasri, Angel Preethi, and E. Kavitha. "Automized Pharmacy Using Face Authentication." Journal of Physics: Conference Series 1937, no. 1 (June 1, 2021): 012024. http://dx.doi.org/10.1088/1742-6596/1937/1/012024.
Full textGuodong Guo, Lingyun Wen, and Shuicheng Yan. "Face Authentication With Makeup Changes." IEEE Transactions on Circuits and Systems for Video Technology 24, no. 5 (May 2014): 814–25. http://dx.doi.org/10.1109/tcsvt.2013.2280076.
Full textTistarelli, M., and E. Grosso. "Active vision-based face authentication." Image and Vision Computing 18, no. 4 (March 2000): 299–314. http://dx.doi.org/10.1016/s0262-8856(99)00059-1.
Full textPigeon, Stéphane, and Luc Vandendorpe. "Image-based multimodal face authentication." Signal Processing 69, no. 1 (August 1998): 59–79. http://dx.doi.org/10.1016/s0165-1684(98)00087-5.
Full textKULKARNI, SARVESH. "SMART AUTHENTICATION USING FACE RECOGNITION." International Journal of Recent Advancement in Engineering & Research 3, no. 7 (July 22, 2017): 9. http://dx.doi.org/10.24128/ijraer.2017.gh89jk.
Full textKang, Sun-Kyoung. "Fast Identity Online-Based Facial Authentication System Development in Mobile." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1582–85. http://dx.doi.org/10.1166/jctn.2021.9599.
Full textChinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (August 20, 2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.
Full textLEE, RAYMOND S. T. "iJADE AUTHENTICATOR — AN INTELLIGENT MULTIAGENT BASED FACIAL AUTHENTICATION SYSTEM." International Journal of Pattern Recognition and Artificial Intelligence 16, no. 04 (June 2002): 481–500. http://dx.doi.org/10.1142/s0218001402001794.
Full textKrithika, L. B. "Face Recognition and Authentication using SIFT." Research Journal of Pharmacy and Technology 10, no. 2 (2017): 401. http://dx.doi.org/10.5958/0974-360x.2017.00081.6.
Full textKhidher, Israa, and Thamir Abdul Hafidh. "Biometrics Identification based Face Image Authentication." JOURNAL OF EDUCATION AND SCIENCE 22, no. 3 (September 1, 2009): 61–74. http://dx.doi.org/10.33899/edusj.2009.57761.
Full textVybornova, O. N., A. A. Pryhodko, and E. M. Sologubova. "USER AUTHENTICATION BY FACE AND MIMIK." Mathematical Methods in Technologies and Technics, no. 9 (2021): 87–91. http://dx.doi.org/10.52348/2712-8873_mmtt_2021_9_87.
Full textBanerjee, Indradip, Dipankar Chatterjee, Souvik Bhattacharyya, and Gautam Sanyal. "Establishing User Authentication using Face Geometry." International Journal of Computer Applications 92, no. 16 (April 18, 2014): 1–7. http://dx.doi.org/10.5120/16090-5259.
Full textŠtruc, Vitomir. "Face authentication using a hybrid approach." Journal of Electronic Imaging 17, no. 1 (January 1, 2008): 011003. http://dx.doi.org/10.1117/1.2885149.
Full textJhansi Rani, G., G. Shanmukhi Rama, K. Ranganath, Tarun Kumar Juluri, and Ch Vinay Kumar Reddy. "Face detection authentication analysis on smartphones." IOP Conference Series: Materials Science and Engineering 981 (December 5, 2020): 032026. http://dx.doi.org/10.1088/1757-899x/981/3/032026.
Full textJonsson, K., J. Kittler, Y. P. Li, and J. Matas. "Support vector machines for face authentication." Image and Vision Computing 20, no. 5-6 (April 2002): 369–75. http://dx.doi.org/10.1016/s0262-8856(02)00009-4.
Full textBanerjee, Debdeep, and Kevin Yu. "3D Face Authentication Software Test Automation." IEEE Access 8 (2020): 46546–58. http://dx.doi.org/10.1109/access.2020.2978899.
Full textV, Veena. "FAMC Face Authentication for Mobile Concurrence." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 1389–94. http://dx.doi.org/10.17762/ijritcc2321-8169.1503106.
Full textMcCool, Christopher, Roy Wallace, Mitchell McLaren, Laurent El Shafey, and Sébastien Marcel. "Session variability modelling for face authentication." IET Biometrics 2, no. 3 (September 2013): 117–29. http://dx.doi.org/10.1049/iet-bmt.2012.0059.
Full textAbate, Andrea F., Riccardo Distasi, Michele Nappi, and Daniel Riccio. "Face authentication using speed fractal technique." Image and Vision Computing 24, no. 9 (September 2006): 977–86. http://dx.doi.org/10.1016/j.imavis.2006.02.023.
Full textLin, Tzung-Han, and Wen-Pin Shih. "Automatic face authentication with self compensation." Image and Vision Computing 26, no. 6 (June 2008): 863–70. http://dx.doi.org/10.1016/j.imavis.2007.10.002.
Full textAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Muhammad Rehman. "Facial Image Encryption for Secure Face Recognition System." Electronics 12, no. 3 (February 3, 2023): 774. http://dx.doi.org/10.3390/electronics12030774.
Full textLi, Daming, Qinglang Su, Lianbing Deng, and Kaicheng Cai. "3D Reconstruction of Face Image Authentication Technology in Electronic Transaction Authentication." IEEE Sensors Journal 20, no. 20 (October 15, 2020): 11909–18. http://dx.doi.org/10.1109/jsen.2019.2958655.
Full textMenezes, Tresnor. "Face Recognition Attendance System using Raspberry Pi." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1145–49. http://dx.doi.org/10.22214/ijraset.2021.37499.
Full textZukarnain, Zuriati Ahmad, Amgad Muneer, and Mohd Khairulanuar Ab Aziz. "Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges." Symmetry 14, no. 4 (April 14, 2022): 821. http://dx.doi.org/10.3390/sym14040821.
Full textZhu, Dexin, Xiaohui Li, Xiaohong Li, Rongkai Wei, Jianan Wu, and Lijun Song. "A Quantum Identity Authentication Protocol Based on Optical Transmission & Face Recognition." International Journal of Online Engineering (iJOE) 14, no. 04 (April 26, 2018): 58. http://dx.doi.org/10.3991/ijoe.v14i04.8374.
Full textKUMAR, AJAY, and DAVID ZHANG. "USER AUTHENTICATION USING FUSION OF FACE AND PALMPRINT." International Journal of Image and Graphics 09, no. 02 (April 2009): 251–70. http://dx.doi.org/10.1142/s0219467809003423.
Full textZeng, Ying, Qunjian Wu, Kai Yang, Li Tong, Bin Yan, Jun Shu, and Dezhong Yao. "EEG-Based Identity Authentication Framework Using Face Rapid Serial Visual Presentation with Optimized Channels." Sensors 19, no. 1 (December 20, 2018): 6. http://dx.doi.org/10.3390/s19010006.
Full textQian, Mingzhu, and Xiaobao Wang. "Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision." Security and Communication Networks 2022 (June 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/5803026.
Full textLee, Yongjin. "Secure Face Authentication Framework in Open Networks." ETRI Journal 32, no. 6 (December 6, 2010): 950–60. http://dx.doi.org/10.4218/etrij.10.1510.0103.
Full textJain, Ayush. "Secure Authentication for Banking Using Face Recognition." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 2, no. 2 (June 2, 2021): 1–8. http://dx.doi.org/10.54060/jieee/002.02.001.
Full textSayed, Mohamed, and Faris Baker. "Thermal Face Authentication with Convolutional Neural Network." Journal of Computer Science 14, no. 12 (December 1, 2018): 1627–37. http://dx.doi.org/10.3844/jcssp.2018.1627.1637.
Full textLiu, Xiaoming, Tsuhan Chen, and B. V. K. Vijaya Kumar. "Face authentication for multiple subjects using eigenflow." Pattern Recognition 36, no. 2 (February 2003): 313–28. http://dx.doi.org/10.1016/s0031-3203(02)00033-x.
Full textDe Marsico, Maria, Michele Nappi, and Daniel Riccio. "Face authentication with undercontrolled pose and illumination." Signal, Image and Video Processing 5, no. 4 (August 7, 2011): 401–13. http://dx.doi.org/10.1007/s11760-011-0244-6.
Full textVazquez-Fernandez, Esteban, and Daniel Gonzalez-Jimenez. "Face recognition for authentication on mobile devices." Image and Vision Computing 55 (November 2016): 31–33. http://dx.doi.org/10.1016/j.imavis.2016.03.018.
Full textZhang, Chongyang. "Representation of face images for personal authentication." Optik - International Journal for Light and Electron Optics 124, no. 17 (September 2013): 2985–92. http://dx.doi.org/10.1016/j.ijleo.2012.09.015.
Full textAngadi, Shanmukhappa A., and Sanjeevakumar M. Hatture. "Face Recognition Through Symbolic Modeling of Face Graphs and Texture." International Journal of Pattern Recognition and Artificial Intelligence 33, no. 12 (November 2019): 1956008. http://dx.doi.org/10.1142/s0218001419560081.
Full textAlzu’bi, Ahmad, Firas Albalas, Tawfik AL-Hadhrami, Lojin Bani Younis, and Amjad Bashayreh. "Masked Face Recognition Using Deep Learning: A Review." Electronics 10, no. 21 (October 31, 2021): 2666. http://dx.doi.org/10.3390/electronics10212666.
Full textXimenes, Agostinho Marques, Sritrusta Sukaridhoto, Amang Sudarsono, and Hasan Basri. "Mobile Platform Biometric Cloud Authentication." INTEK: Jurnal Penelitian 6, no. 2 (November 12, 2019): 75. http://dx.doi.org/10.31963/intek.v6i2.1525.
Full textAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System." Scientific Programming 2022 (November 25, 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.
Full textAnand, Diksha, and Kamal Gupta. "Face Spoof Detection System Based on Genetic Algorithm and Artificial Intelligence Technique: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 6 (June 30, 2018): 51. http://dx.doi.org/10.23956/ijarcsse.v8i6.722.
Full textBanh, Quoc Tuan, Hong Minh Le, Hoang Dat Luu, Hai Long Ngo, Khac Thien Cao, Viet Hoang Do, and Van Binh Le. "Research and development of a two-factors face authentication system using an invisible F-QR code on ID card by 1064 nm laser and AI camera." Ministry of Science and Technology, Vietnam 64, no. 10 (October 12, 2022): 33–37. http://dx.doi.org/10.31276/vjst.64(10db).33-37.
Full textMehta, Miti. "Online Voting System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1471–76. http://dx.doi.org/10.22214/ijraset.2022.42552.
Full textHussain, Tahir, Dostdar Hussain, Israr Hussain, Hussain AlSalman, Saddam Hussain, Syed Sajid Ullah, and Suheer Al-Hadhrami. "Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems." Computational and Mathematical Methods in Medicine 2022 (February 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/5137513.
Full text