Algorithms for User Detection and Authentication based on Face Analysis

被引:0
|
作者
Chovanec, M. [1 ]
Bily, J. [2 ]
Chovancova, E. [2 ]
Radusovsky, J. [2 ]
机构
[1] Tech Univ Kosice, Inst Comp Technol, Kosice, Slovakia
[2] Tech Univ Kosice, Dept Comp & Informat, Kosice, Slovakia
来源
2013 11TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2013) | 2013年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
nowadays, there are many methods for identifying people, but most common and probably the oldest one is identification based on face recognition. Even though for people this method is natural, for computers it is a very challenging and complex problem. This paper describes one the known approaches for face recognition, which uses principal component analysis to compare and recognize faces. Obviously, a before face is recognized, it has to be detected. For process of detection, method based on Haar features is used.
引用
收藏
页码:63 / 66
页数:4
相关论文
共 50 条
  • [41] A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem
    Al-Jarba, Fatimah
    Al-Khathami, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 303 - 316
  • [42] Two color based face detection algorithms: A comparative approach
    Teodorescu, TD
    Maiorescu, VA
    Nagel, JL
    Ansorge, M
    SCS 2003: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2003, : 289 - 292
  • [43] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [44] Outlier detection for keystroke biometric user authentication
    Ismail, Mahmoud G.
    Salem, Mohammed A. -M.
    Abd El Ghany, Mohamed A.
    Aldakheel, Eman Abdullah
    Abbas, Safia
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [45] Outlier detection for keystroke biometric user authentication
    Ismail M.G.
    Salem M.A.-M.
    El Ghany M.A.A.
    Aldakheel E.A.
    Abbas S.
    PeerJ Computer Science, 2024, 10
  • [46] Remote User Authentication Scheme A comparative analysis and improved behavioral biometrics based authentication scheme
    Kumar, Pramod
    Rauthan, Manmohan Singh
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 311 - 313
  • [47] A survey on usability and security features in graphical user authentication algorithms
    Lashkari, Arash Habibi
    Farmand, Samaneh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 195 - 204
  • [48] Compensating for variable recording conditions in frontal face authentication algorithms
    Tefas, A
    Menguy, Y
    Kotropoulos, C
    Richard, G
    Pitas, I
    Lockwood, P
    ICASSP '99: 1999 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, PROCEEDINGS VOLS I-VI, 1999, : 3561 - 3564
  • [49] Design of an Authentication System Based on Face Recognition and the Second Generation ID Detection
    Han, Pengwu
    Ji, Cong
    Wang, Siming
    Zhang, Daixing
    Yang, Dong
    AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 968 - 971
  • [50] EchoFace: Acoustic Sensor-Based Media Attack Detection for Face Authentication
    Chen, Huangxun
    Wang, Wei
    Zhang, Jin
    Zhang, Qian
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03) : 2152 - 2159