A new face authentication system for memory-constrained devices

被引:29
|
作者
Lee, K [1 ]
Byun, H [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
关键词
biometrics; face authentication; memory-constrained devices;
D O I
10.1109/TCE.2003.1261219
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Though biometrics to authenticate a person is a convenient tool, typical authentication algorithms by using biometrics may not be executable on the memory-constrained devices such as smart cards. We present a solution of a face authentication algorithm for the open issue. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. Our experimental results show that the proposed method provides good performance in terms of accuracy and memory requirement(1).
引用
收藏
页码:1214 / 1222
页数:9
相关论文
共 50 条
  • [1] A Metadata Encoding for Memory-Constrained Devices
    Ali, Farha
    Feaster, Yvon
    Wahba, Sally K.
    Hallstrom, Jason O.
    [J]. PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 191 - 196
  • [2] Garbage collector assisted memory offloading for memory-constrained devices
    Chen, DQ
    Messer, A
    Milojicic, D
    Dwarkadas, S
    [J]. FIFTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, 2003, : 54 - 63
  • [3] Adaptive Flash Sorting for Memory-Constrained Embedded Devices
    Lawrence, Ramon
    [J]. 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 321 - 326
  • [4] Efficient External Sorting for Memory-Constrained Embedded Devices with Flash Memory
    Jackson, Riley
    Gresl, Jonathan
    Lawrence, Ramon
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (04)
  • [5] Tracking Recurrent Concepts Using Context in Memory-constrained Devices
    Bartolo Gomes, Joao
    Menasalvas, Ernestina
    Sousa, Pedro A. C.
    [J]. UBICOMM 2010: THE FOURTH INTERNATIONAL CONFERENCE ON MOBILE UBIQUITOUS COMPUTING, SYSTEMS, SERVICES AND TECHNOLOGIES, 2010, : 446 - 451
  • [6] Anomaly Prediction Based on Machine Learning for Memory-Constrained Devices
    Kitagawa, Yuto
    Ishigooka, Tasuku
    Azumi, Takuya
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1797 - 1807
  • [7] An OPC UA PubSub Implementation Approach for Memory-Constrained Sensor Devices
    Quang-Duy Nguyen
    Bellot, Patrick
    Petton, Pierre-Yves
    [J]. 2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 999 - 1005
  • [8] Mask Compression: High-Order Masking on Memory-Constrained Devices
    Saarinen, Markku-Juhani O.
    Rossi, Melissa
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 65 - 81
  • [9] FlexNN: Efficient and Adaptive DNN Inference on Memory-Constrained Edge Devices
    Li, Xiangyu
    Li, Yuanchun
    Li, Yuanzhe
    Cao, Ting
    Liu, Yunxin
    [J]. PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2024, 2024, : 709 - 723
  • [10] Shift Hashing for Memory-Constrained Applications
    Deodhar, Sushamna
    Tharp, Alan L.
    [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 531 - 536