Sciweavers

104 search results - page 9 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
FGR
2008
IEEE
232views Biometrics» more  FGR 2008»
15 years 6 months ago
3D face recognition from multiple images: A shape-from-motion approach
In this article we explore the use of methodologies for 3D reconstruction from multiple images to recognize faces. We try to devise a strategy to tackle the problem of recognizing...
Manuel Marques, João Costeira
90
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 6 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
92
Voted
ICB
2007
Springer
208views Biometrics» more  ICB 2007»
15 years 5 months ago
Face Matching Between Near Infrared and Visible Light Images
Abstract. In many applications, such as E-Passport and driver’s license, the enrollment of face templates is done using visible light (VIS) face images. Such images are normally ...
Dong Yi, Rong Liu, Rufeng Chu, Zhen Lei, Stan Z. L...
FGR
2008
IEEE
243views Biometrics» more  FGR 2008»
15 years 6 months ago
Real-time face recognition for human-robot interaction
The ability to recognize people is a key element for improving human-robot interaction in service robots. There are many approaches for face recognition; however, these assume unr...
Claudia Cruz, Luis Enrique Sucar, Eduardo F. Moral...
FGR
2004
IEEE
94views Biometrics» more  FGR 2004»
15 years 3 months ago
A Symmetric Transformation for LDA-based Face Verification
One of the major problem in face verification is to deal with a few number of images per person to train the system. A solution to that problem is to generate virtual samples from...
Sébastien Marcel