Algorithms for User Detection and Authentication based on Face Analysis

被引:0
|
作者
Chovanec, M. [1 ]
Bily, J. [2 ]
Chovancova, E. [2 ]
Radusovsky, J. [2 ]
机构
[1] Tech Univ Kosice, Inst Comp Technol, Kosice, Slovakia
[2] Tech Univ Kosice, Dept Comp & Informat, Kosice, Slovakia
来源
2013 11TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2013) | 2013年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
nowadays, there are many methods for identifying people, but most common and probably the oldest one is identification based on face recognition. Even though for people this method is natural, for computers it is a very challenging and complex problem. This paper describes one the known approaches for face recognition, which uses principal component analysis to compare and recognize faces. Obviously, a before face is recognized, it has to be detected. For process of detection, method based on Haar features is used.
引用
收藏
页码:63 / 66
页数:4
相关论文
共 50 条
  • [21] Novelty Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Rodriguez, Jonathan
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 837 - 842
  • [22] Outlier Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2778 - 2783
  • [23] User Interface-Based Repeated Sequence Detection Method for Authentication
    Kang, Shin Jin
    Kim, Soo Kyun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03): : 2573 - 2588
  • [24] A complete comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms
    Lashkari, Arash Habibi
    Towhidi, Farnaz
    Saleh, Rosli
    Farmand, Samaneh
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 527 - +
  • [25] Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication
    Li, Yan
    Li, Yingjiu
    Yan, Qiang
    Kong, Hancong
    Deng, Robert H.
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1558 - 1569
  • [26] Continuous User Authentication System: A Risk Analysis Based Approach
    Neha
    Chatterjee, Kakali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 281 - 295
  • [27] Continuous User Authentication System: A Risk Analysis Based Approach
    Kakali Neha
    Wireless Personal Communications, 2019, 108 : 281 - 295
  • [28] Novel user authentication method based on body composition analysis
    Pawel Laka
    Zbigniew Korzeb
    Wojciech Mazurczyk
    Annals of Telecommunications, 2021, 76 : 175 - 185
  • [29] Novel user authentication method based on body composition analysis
    Laka, Pawel
    Korzeb, Zbigniew
    Mazurczyk, Wojciech
    ANNALS OF TELECOMMUNICATIONS, 2021, 76 (3-4) : 175 - 185
  • [30] User Modeling via Anomaly Detection Techniques for User Authentication
    Abu Sulayman, Iman I. M.
    Ouda, Abdelkader
    2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 169 - 176