Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Recently, airborne video surveillance platforms have gained greater acceptance for use in a variety of DoD missions due to their utility, affordability and autonomy. While a varie...
Richard W. Cannata, Steven G. Blask, John A. Van W...
In this paper, a new scheme to address the face recognition problem is proposed. Different from traditional face recognition approaches which represent each facial image by a sing...
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
The ability to recognize people is a key element for improving human-robot interaction in service robots. There are many approaches for face recognition; however, these assume unr...
Claudia Cruz, Luis Enrique Sucar, Eduardo F. Moral...